The CIM Courses system will be down temporarily undergoing routine maintenance.
Mar 18, 2016 by Eva Vincze (evincze)
FORS 6264 : Computer Network Defense
Fri, 18 Mar 2016 17:36:11 GMT
Wed, 06 Jan 2016 21:00:55 GMT
Catalog Pages referencing this course
Forensic Sciences (FORS)
Programs referencing this course
DF-MS: Digital Forensics
HTCI-MFS: High-Technology Crime Investigation
Columbian College of Arts and Sciences
Forensic Science (FORS)
Long Course Title
Computer Network Defense
Short Course Title
Computer Network Defense
Number of Credits
Default Grading Method
Repeatable for Credit?
Frequency of Offering
Are there Course Equivalents?
Are Fees Applicable?
Explanation and Description of Fees
Are Additional Resources Required?
Explanation of Additional Resources
Justification for Additional Resources
Describe any Sources of Additional Funding
Identification of common threats to enterprise information systems and the tools, techniques, and strategies for mitigating those threats. Access control concepts, methodologies, and implementation within centralized and decentralized environments across an enterprise's computer systems; common methods of cyber-attacks; principles, means, and methods for ensuring system integrity, confidentiality, and availability; auditing and monitoring technologies for preventative, detective, and corrective measures.
As a result of completing this course, students will be able to: 1. Categorize security technologies based on the services they provide 2. Describe the roles of individuals in identifying and securing an organization’s information assets 3. Understand access control concepts, methodologies and implementations within centralized and decentralized environments across the enterprise’s computer systems 4. Explain the principles, means, and methods of disguising information to ensure its confidentiality, integrity, and authenticity (CIA) and other security strategies 5. Understand how audit and monitoring technologies permit the identification of security events and assist in the identification of key elements so that pertinent information can be reported to the appropriate authority 6. Demonstrate an understanding of communications and network security as it relates to voice communications; data communications in terms of local area, wide area, and remote access;
Uploaded a Course Syllabus
Explanation of how the course differs from similar GW courses
Course Title and Description have been changed to better reflect the content of the course.
Course Reviewer Comments