100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 3 out of 9 pages.
1 COURSE SYLLABUS (FALL 2018) IFT-302 – Foundations of Information and Computer System Security Instructor: Prof. Rodriguez Credit: 3 Telephone: email address:[email protected]Office Hours:Sutton 301M, Tu/Th – 8:30 a.m. to 10:00 a.m. or by appointment Class /T/TH ⸠10:30-11:45 PERALTA 301 Course Description: The purpose of this course is to introduce the student to information technology (IT) security aspects and how technology can be vulnerable to unwanted intrusions. Project-based introduction to privacy, ethics, legal, social and professional responsibilities for information technology. Principles of information security and assurance and their implications on access. Tools and methods to identify intrusion, best security practices. Securing communications and applications. Prerequisites:IFT201 Course Overview: IFT 302is an introductory course to computer security and information assurance. Information assurance is a combination of both art and science and is an interdisciplinary activity that protects the most complex organization asset – its data and the ability to communicate information and data to other organizations or entities, both internally and externally, in a safe and secure manner. Computer security is becoming increasingly important today as the number of security incidents steadily climb. This course recognizes the fact that many corporations are now spending significant portions of their information technology (IT) budget on security hardware, software, services and personnel. The course starts by evaluating the challenges of today in facing the aspects of computer security in conjunction with RFC 2828, Internet Security Glossaryand X.800, Security Architecture for OSI. Learning Outcomes: At the completion of this course, students will be able to: CLO 1.Given the fact that companies are placing an increasing emphasis on computer security, describe the basic principles that underlie security issues including the CIA Security Model.CLO 2.Given the need for encrypting data, explain the fundamentals and use of cryptographic tools.CLO 3.Describe the characteristics of Symmetric and Asymmetric encryption systems, including how each technique is used in Network Security.CLO 4.Demonstrate an understanding of Public Key Cryptography.