Date Submitted: Wed, 14 Sep 2016 21:27:41 GMT

Viewing: PSCS 4101 : Introduction to Protection Technologies

Last approved: Mon, 23 May 2016 18:33:12 GMT

Last edit: Fri, 06 Nov 2015 22:13:37 GMT

Changes proposed by: cybersec
College of Professional Studies
Prof Studies-Cybersecurity (PSCS)
PSCS
4101
Introduction to Protection Technologies
Intro Protection Technologies
Fall 2015
4
Course Type
Lecture
Seminar
Default Grading Method
Letter Grade

No
No

Corequisites

25

Frequency of Offering

Term(s) Offered

Are there Course Equivalents?
No
 
No
Fee Type


No


The technologies most commonly used to protect an organization’s information; threat agents and the exploitation techniques they use to compromise systems; and defensive technologies, including encryption, enterprise firewalls, intrusion detection/prevention, and access control technologies.
- Understand and implement cybersecurity requirements - Enumerate the different groups attacking today’s organizations and explain their goals, motives and their techniques - Protect and effectively defend computer networks against malicious activities - Design a secure network that employs a layered defense architecture - Analyze an existing network or system and discover and list the potential weaknesses that adversaries might seek to exploit - Communicate and interact professionally with other classmates during group lab exercises
Uploaded a Course Syllabus

Course Attribute


cbeil (Wed, 25 Feb 2015 17:29:37 GMT): Rollback: Per your request
Key: 9702