1 |
- |
Introduction: Computer Security, Threats, Harm, Vulnerabilities, Controls |
- |
2 |
- |
Authentication, Access Control, and Cryptography |
- |
3 |
- |
Programs and Programming: Unintentional (Non-malicious) Programming |
- |
4 |
- |
Oversights, Malicious Code, Malware, Countermeasures |
- |
5 |
- |
The Web User Side: Browser Attacks, Web Attacks Targeting Users, Obtaining User |
- |
6 |
- |
Operating Systems: Security in Operating Systems, Security in the Design of Operating Systems |
- |
7 |
- |
Network Concepts: Threats to Network Communications, Wireless Network Security |
- |
8 |
- |
MID-TERM EXAM |
- |
9 |
- |
Network Concepts: Strategic Defenses: Security Countermeasures, Cryptography |
- |
10 |
- |
Databases: Introduction to Databases, Security Requirements of Databases, Reliability |
- |
11 |
- |
Cloud Computing : Cloud Computing Concepts, Moving to the Cloud, Cloud Security Tools and Techniques, Cloud Identity Management, Securing IaaS |
- |
12 |
- |
Privacy Concepts, Privacy Principles and Policies, Authentication and Privacy |
- |
13 |
- |
Authentication and Privacy, Data Mining, Privacy on the Web, Email Security |
- |
14 |
- |
Privacy Impacts of Emerging Technologies, Where the Field Is Headed |
- |
15 |
- |
Management and Incidents: Security Planning, Business Continuity Planning |
- |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |