ISOL534 _Syllabus _Flow_Spring 2018 IIG.pdf

ISOL534 _Syllabus _Flow_Spring 2018 IIG.pdf - University of...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
University of the Cumberlands School of Computer and Information Sciences ISOL 534 Application Security Page 1 Course Summary Course Number and Name ISOL 534 Application Security Course Term and Delivery 2018 Spring IIG Asynchronous Online Course Course Instructor Dr. Carrie Butler, Adjunct Professor Email: [email protected] Office Hours: By Appointment Catalog Course Description This course discusses security implementations for various Windows platforms and applications. Areas of study involve identifying and examining security risks, security solutions and tools available for various Windows platforms and applications. Course Objectives Course Competencies/ Learning Objectives Course Learning Objectives Major Instructional Areas Assessment Method Explain information security and how it applies to the Microsoft Windows operating systems. Exams, DB Posts, Labs Explain security features of the Microsoft Windows operating systems. Exams, DB Posts, Labs Implement secure access controls when setting up Microsoft Windows in a given organization. Exams, DB Posts, Labs Set up encryption in a given organization to secure Windows Exams, DB Posts, Labs
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
University of the Cumberlands School of Computer and Information Sciences ISOL 534 Application Security Page 2 environment. Install controls to protect a given Windows system from malware. Exams, DB Posts, Labs Define and apply Group Policy controls in Microsoft Windows. Exams, DB Posts, Labs Explain profile and audit tools to keep Windows systems secure. Exams, DB Posts, Labs Perform backup and restore operations on a given Windows system. Exams, DB Posts, Labs Design techniques to protect Windows networks from security vulnerabilities. Exams, DB Posts, Labs Develop a security administration framework to ensure your organization meets its security policy goals. Exams, DB Posts, Labs Identify and implement the most effective security controls to make computers and networks as secure as possible. Exams, DB Posts, Labs Design techniques to protect given Windows application software from security vulnerabilities. Exams, DB Posts, Labs Apply best practices for handling a given Microsoft Windows system and application incident. Exams, DB Posts, Labs
Image of page 2