Quick Search
- Accounting
- Acquisition and Contract Mgmt
- Bioinformatics
- Biotechnology Studies
- Biosecurity and Biodefense
- Biotechnology Management
- Biotech Regulatory Affairs
- Cyber Comm & Leadership
- Doctoral Stds in Comm College
- Cloud Computing Systems
- Criminal Justice Management
- Cybersecurity Mgmt and Policy
- Cyber Operations
- Cybersecurity Technology
- Cybersecurity
- Data Analytics
- Doctor of Business Admin
- Database Systems Technology
- Decisive Comm & Leadership
- DE Policy and Management
- Distance Education Technology
- DE in Teaching and Training
- Digital Forensics & Cyber Inv
- Doctoral Stds in Comm College
- Education: Instructional Tec
- Education Teacher Preparation
- Emergency Management
- Environmental Management
- Financial Management
- Global Health Management
- Health Care Administration
- Health Informatics Admin
- Human Resource Mgmt and Devpm
- Homeland Security Management
- Informatics
- Information Assurance
- Intelligence Management
- Education: Instructional Tech
- Information Systems & Service
- Information Technology
- Learning Design & Technology
- Business Administration
- Management
- Marketing
- MS in Acct Financial Mgmt
- Strategic Communications
- Nonprofit Management
- Distance Education
- Project Management
- Software Engineering
- Systems Engineering
- Transformational Leadership
- Univ College Special Topics
2024 Spring: January 10 - June 25
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|
2024 Spring: January 10 - June 25
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|---|---|---|---|---|---|---|
INFA 610 | Foundations of Information Security and Assurance (3) | ||||||
(To be taken as the first course in the program.) An overview of techniques for ensuring and managing information security. Topics include administrative and technical security controls to prevent, detect, respond to, and recover from cyber attacks; risk and vulnerability analysis to select security controls; security planning; security architecture; security evaluation and assessment; and legal, ethical, and privacy aspects of information assurance. Discussion also covers information security fundamentals, such as cryptography, authentication, and access control techniques, and their use in network, operating system, database, and application layers. Emphasis is on security issues of current importance. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24792 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Brobbey-Mensah, Kwame | Syllabus | Course Materials | |||||
INFA 610 | Foundations of Information Security and Assurance (3) | ||||||
(To be taken as the first course in the program.) An overview of techniques for ensuring and managing information security. Topics include administrative and technical security controls to prevent, detect, respond to, and recover from cyber attacks; risk and vulnerability analysis to select security controls; security planning; security architecture; security evaluation and assessment; and legal, ethical, and privacy aspects of information assurance. Discussion also covers information security fundamentals, such as cryptography, authentication, and access control techniques, and their use in network, operating system, database, and application layers. Emphasis is on security issues of current importance. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25091 | 9080 | 14 Feb 2024-07 May 2024 | Open | Online | |||
Faculty: McGowan, Stephen Patrick | Syllabus | Course Materials | |||||
INFA 610 | Foundations of Information Security and Assurance (3) | ||||||
(To be taken as the first course in the program.) An overview of techniques for ensuring and managing information security. Topics include administrative and technical security controls to prevent, detect, respond to, and recover from cyber attacks; risk and vulnerability analysis to select security controls; security planning; security architecture; security evaluation and assessment; and legal, ethical, and privacy aspects of information assurance. Discussion also covers information security fundamentals, such as cryptography, authentication, and access control techniques, and their use in network, operating system, database, and application layers. Emphasis is on security issues of current importance. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25133 | 9081 | 14 Feb 2024-07 May 2024 | Open | Online | |||
Faculty: Pathak, Divaker V | Syllabus | Course Materials | |||||
INFA 620 | Network and Internet Security (3) | ||||||
An introduction to the security concepts needed for the design, use, and implementation of secure voice and data communications networks, including the internet. A brief review of networking technology and standards (including an introduction to internet communication protocols) is provided. Security subjects addressed include defense models, security policy development, authentication and authorization controls, firewalls, packet filtering, virtual private networks (VPNs), and wireless network security. A project on network security in a hypothetical scenario based on the inputs from government agencies and commercial organizations is assessed by a team of experts who are working in the field. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24797 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Choi, Seonho | Syllabus | Course Materials | |||||
INFA 620 | Network and Internet Security (3) | ||||||
An introduction to the security concepts needed for the design, use, and implementation of secure voice and data communications networks, including the internet. A brief review of networking technology and standards (including an introduction to internet communication protocols) is provided. Security subjects addressed include defense models, security policy development, authentication and authorization controls, firewalls, packet filtering, virtual private networks (VPNs), and wireless network security. A project on network security in a hypothetical scenario based on the inputs from government agencies and commercial organizations is assessed by a team of experts who are working in the field. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25118 | 9080 | 14 Feb 2024-07 May 2024 | Open | Online | |||
Faculty: Ramkumar, Vasant C | Syllabus | Course Materials | |||||
INFA 630 | Intrusion Detection and Intrusion Prevention (3) | ||||||
An exploration of the theory and implementation of intrusion detection and intrusion prevention. Topics include network-based, host-based, and hybrid intrusion detection; intrusion prevention; attack pattern identification; deployment; response; surveillance; damage assessment; data forensics; data mining; attack tracing; system recovery; and continuity of operation. A project on intrusion detection and intrusion prevention in a hypothetical scenario based on the inputs from government agencies and commercial organizations is assessed by a team of experts who are working in the field. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24798 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Gantz, Stephen D | Syllabus | Course Materials | |||||
INFA 640 | Cryptology and Data Protection (3) | ||||||
An overview of the theory of encryption using symmetric and asymmetric keys, current protocols for exchanging secure data (including the Data Encryption Standard and the Advanced Encryption Standard), and secure communication techniques. A review of the historical development of cryptographic methods and cryptanalysis tools is provided. Public Key Infrastructure and the use of digital signatures and certificates for protecting and validating data are examined. Strategies for the physical protection of information assets are explored. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24796 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Aguilera, Leonardo | Syllabus | Course Materials | |||||
INFA 650 | Computer Forensics (3) | ||||||
An introduction to the fundamental concepts behind the collection and analysis of the digital evidence left behind in a digital crime scene. Topics include the identification, preservation, collection, examination, analysis, and presentation of evidence for prosecution purposes. Discussion also covers the laws and ethics related to computer forensics and challenges in computer forensics. Network forensics is briefly explored. A project on computer forensics or network forensics in a hypothetical scenario based on the inputs from government agencies and commercial organizations is assessed by a team of experts who are working in the field. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24794 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Robinson, Michael K | Syllabus | Course Materials | |||||
INFA 660 | The Law, Regulation and Ethics of Information Assurance (3) | ||||||
An overview of the legal, regulatory, and ethical issues related to cyberspace. Emphasis is on developing skills in spotting ethical and legal issues and navigating through the complex and changing legal and regulatory environment as it applies to behavior in cyberspace. Various resources and materials about the ethical and legal operation of modern computer systems, applications, and networks are presented. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24799 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Asllani, Arben | Syllabus | Course Materials | |||||
INFA 660 | The Law, Regulation and Ethics of Information Assurance (3) | ||||||
An overview of the legal, regulatory, and ethical issues related to cyberspace. Emphasis is on developing skills in spotting ethical and legal issues and navigating through the complex and changing legal and regulatory environment as it applies to behavior in cyberspace. Various resources and materials about the ethical and legal operation of modern computer systems, applications, and networks are presented. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25120 | 9080 | 14 Feb 2024-07 May 2024 | Open | Online | |||
Faculty: Foster, Stephen W | Syllabus | Course Materials | |||||
INFA 670 | Information Assurance Capstone (3) | ||||||
Prerequisites: INFA 610, INFA 620, INFA 630, INFA 640, INFA 650, and INFA 660 (3 credits may be taken concurrently). A study of information assurance that integrates and applies concepts previously studied. Best practices and appropriate technologies to design, implement, manage, evaluate, and further improve information security are explored. Emerging trends are analyzed to understand their potential effect on information security and assurance. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24800 | 9040 | 10 Jan 2024-02 Apr 2024 | Open | Online | |||
Faculty: Boyles, Kyle D | Syllabus | Course Materials |