IAS5030
Identifying and Managing Risk
4 quarter credits
Learners identify common information security risk analysis methodologies, their characteristics, pros and cons, and applications. Learners examine the sources of risk, including external malicious attackers, intentional and accidental attacks by internal users, and threats from environmental and structural sources. Learners also identify vulnerabilities in hardware, software, locations, and procedures that provide an opening to attackers and create risk to organizations. Learners demonstrate risk assessment techniques through hands-on application of software vulnerability testing tools. Prerequisite(s): IAS5025.
4 quarter credits
IAS5210
Data Communications
4 quarter credits
In this course, learners develop and apply knowledge regarding data communication terminology, standards, different networks in data communication, security, integrity as well as privacy in and application of data communication in real-life environments. Learners analyze various innovations in data communication and develop a working knowledge of the tools and techniques used to manage data communication.
4 quarter credits
IAS5220
Network Security Controls and Testing
4 quarter credits
Learners study cryptographic algorithms, protocols, and how they protect information in various states. Learners apply methodology to detect, analyze, and mitigate vulnerabilities and threats within a network environment, and examine the latest network technologies and security issues involved in network communications. Finally, learners identify and demonstrate ways of exploiting vulnerabilities to gain access to a system through penetration testing and network forensics techniques.
4 quarter credits
IAS5230
Secure Network Design and Engineering
4 quarter credits
Learners investigate abstract data types and how to address them in solving cybersecurity problems related to network design and engineering. Learners also analyze security requirements while designing network operational systems in order to gain approvals in recognition and compliance with organizational governance and processes. Finally, learners articulate how virtualization is implemented, deployed, and used, and describe the implications that interfaces between major components of virtualized systems have for security.
4 quarter credits
IAS5200
Network Architecture and Cyberoperations
4 quarter credits
Learners in this course study common security architectures to help identify potential vulnerabilities in architectures, and learn to design secure architectures. Learners identify issues related to the design and implementation of operating system concepts, components and interfaces, and design and implement significant architectural changes to an existing operating system. Learners also examine the authorities, roles, and steps associated with cyber operations, and develop a working knowledge regarding the security issues associated with building complex systems out of third-party components of unknown origin.
4 quarter credits