James T. Farricker
Various topics in informatics.
Course will cover principles of Computing Security & Information Assurance, the basic underlying associated technologies in the field/industry as well as understanding common threat vectors, Information Assurance risk management & mitigation, and application of Computing Security & IA tools and methods.
Student learning goals
Understand the underlying technologies associated with Computing Security & Info Assurance
Demonstrate understanding of threats, vulnerabilities and countermeasures
Understand common technical concepts, terminology, tools/methods used in Computing Security & Info Assurance
Demonstrate understanding of setting up security policies as well as implementation aspects of security mechanisms (methods, tools,procedures
Apply Computing Security and Info Assurance principles to variety of use cases, case studies and lab environment challenges
General method of instruction
Lectures covering Bishop Computer Security text (2012) as well as practical aspects of CompSec/IA, with labs that apply concepts to use cases, case studies and lab exercises.
Class assignments and grading
Participation (class preparation, quizzes & written assignments) - 15 % Midterm Exam - 25 % Labs - 25 % Final Exam - 35 %