| 1 |
- |
Introduction: Computer Security, Threats, Harm, Vulnerabilities, Controls |
- |
| 2 |
- |
Authentication, Access Control, and Cryptography |
- |
| 3 |
- |
Programs and Programming: Unintentional (Non-malicious) Programming |
- |
| 4 |
- |
Oversights, Malicious Code, Malware, Countermeasures |
- |
| 5 |
- |
The Web User Side: Browser Attacks, Web Attacks Targeting Users, Obtaining User |
- |
| 6 |
- |
Operating Systems: Security in Operating Systems, Security in the Design of Operating Systems |
- |
| 7 |
- |
Network Concepts: Threats to Network Communications, Wireless Network Security |
- |
| 8 |
- |
Network Concepts: Strategic Defenses: Security Countermeasures, Cryptography |
- |
| 9 |
- |
Databases: Introduction to Databases, Security Requirements of Databases, Reliability |
- |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
- |
Cloud Computing : Cloud Computing Concepts, Moving to the Cloud, Cloud Security Tools and Techniques, Cloud Identity Management, Securing IaaS |
- |
| 12 |
- |
Privacy Concepts, Privacy Principles and Policies, Authentication and Privacy |
- |
| 13 |
- |
Authentication and Privacy, Data Mining, Privacy on the Web, Email Security |
- |
| 14 |
- |
Privacy Impacts of Emerging Technologies, Where the Field Is Headed |
- |
| 15 |
- |
Management and Incidents: Security Planning, Business Continuity Planning |
- |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |