Course Outline:
This course aims to give students a thorough understanding of computer security technologies. This includes the following topics
-
Implement security-enhanced computing baselines in an organization.
-
Understand what a security policy is and what the major mechanisms for implementing security policies are.
-
Explain common attacks against network assets, the associated threats and vulnerabilities, and what network security personnel do to secure assets.
-
Explain how to use cryptography to help protect information and how to choose an appropriate encryption method for an organization.
-
Help protect transmission of data by identifying threats to network devices and implementing security for common data transmission, remote access, and wireless network traffic.
-
Identify common security threats and vulnerabilities to directory services and DNS, and then apply security methods to help protect them.
-
Preserve business continuity by implementing a security-enhanced disaster recovery strategy, communicating risks to others, and performing secure backup and recovery.