This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment specialist at 855-646-5286.
|Course Code||ITEC 6620||Course||Information and Systems Security||Credits||(3 sem. cr.)|
|Course Code||ITEC 6630||Course||Computer Law, Crime, and Investigation||Credits||(3 sem. cr.)|
|Course Code||ITEC 6640||Course||Topics in High-Assurance Computing||Credits||(3 sem. cr.)|
Participants in this course study in-depth techniques for defending IT infrastructure against attack. Students explore tools for configuring and testing system and network security, and they examine administrative and operational countermeasures. Students discuss a range of active responses to a security breach.
Security professionals need to understand the legal context of their work: Many laws apply to IT crimes, and botched investigations can have serious consequences. Students learn about the types of offenses and their consequences under the law. Investigations of breaches must be conducted methodically and with great care. Students examine the various types of cyber offenses and techniques for investigating them, as well as ethical uses of information and computing resources in organizations.
Individual, group, and organizational behavior can have an enormous effect on safety and security. Because security professionals often observe that security is more dependent on people than on technology, they must have a clear understanding of human factors. Students examine advanced topics in the practice of information assurance, such as using social psychology to implement security.