This course will present an overview of the threats to your information technology infrastructure and intellectual property, with an emphasis on the detection and prevention of intrusions or theft. The protection of services such as web services, file sharing, and e-mail will be analyzed. The vulnerabilities and hardening of major operating systems such as Linux and Windows will be discussed. The course takes a holistic approach, discussing the technical but focusing on the need for proper training and procedures in the maintenance of an effective yet secure information technology infrastructure. While the material of the course is technical in nature, no systems administration or software development experience is assumed. A good familiarity with the use of the Internet and computers is required, and some knowledge of TCP/IP would be helpful.
Introduction to Information Security
Management Information Systems
Monday, November 7, 2016 to Monday, February 13, 2017