Preview

Csia 301 - Syllabus

Good Essays
Open Document
Open Document
4678 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Csia 301 - Syllabus
Syllabus for CSIA 301 Faculty Contact Information
Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.

Course Description
Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.

Course Goals/Objectives
After completing this course, you should be able to
     

describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The Syllabus on Info 3010

    • 2401 Words
    • 10 Pages

    INFO 3010-21 Business Modeling Spring 2012 Instructor: Professor Vadim Balashov Office: GWI 701 (7th floor) Office Hours: Monday/Wednesday 10:45AM – 11:30AM or by appointment Class Meeting Day & Time: Monday/Wednesday – 6:30PM – 7:45PM Course Description:…

    • 2401 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    The purpose of this course is to familiarize the student with the basic concepts of Geology.…

    • 1344 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    BUA101 301 Fall2014 Syllabus

    • 2483 Words
    • 14 Pages

    Previous to teaching for Burlington County College, I taught as a Business Lecturer for Bergen Community College and…

    • 2483 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Bsa310 Syllabus

    • 1752 Words
    • 8 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 1752 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Cs113 Course Syllabus

    • 3184 Words
    • 13 Pages

    An emphasis is placed on study, communication, and thinking skills that support academic achievement. Students also examine the relationship between learning and motivation.…

    • 3184 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Syllabus En301

    • 2340 Words
    • 10 Pages

    Professional communication is specialized writing and communication that helps students respond to the challenges of a technical world. In this course, students, as professionals, will analyze needs and concerns for specific workplace situations, organize effective solutions, and prepare and produce the needed memos, reports, presentations, web-sites and/or other items, which will then be assessed and evaluated by other students acting as intended users. Students will create, design, and package these documents, selecting appropriate communication technology to accomplish the task, and will then display the technical data in writing and visually, as well as present such information orally when applicable. Students should be familiar with desktop publishing and electronic presentations.…

    • 2340 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays

Related Topics