草霉视频原创

College Catalog

SEC Info Systems Security

Courses are listed by course discipline prefix, number, course title, credit hours, and, in parentheses, the number of lecture, laboratory and/or work experience/clinical hours, and the semester the course is offered. Local and state prerequisites and corequisites are identified by superscript L for localL and S for stateS. The symbol 鈥淎ND鈥 indicates the course will be offered 鈥淎s Needs Demand.鈥

UGETC represents the Universal General Education Transfer Component as described in the Comprehensive Articulation Agreement (CAA).

Prefix Number Title Hours Semester
SEC 110 Security Concepts 3 (2-2) Fall, Spring

Prerequisite: None

Corequisite: None

This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.(2013 SP)

Prefix Number Title Hours Semester
SEC 160 Security Administration I 3 (2-2) Spring

Prerequisite: None

Corequisite: None

This course provides an overview of security administration and fundamentals of designing security architectures. Topics include networking technologies, TCP/IP concepts, protocols, network traffic analysis, monitoring, and security best practices. Upon completion, students should be able to identify normal network traffic using network analysis tools and design basic security defenses.(2016 FA)

Prefix Number Title Hours Semester
SEC 210 Intrusion Detection 3 (2-2) Fall

Prerequisite: None

Corequisite: None

This course introduces the student to intrusion detection methods in use today. Topics include the types of intrusion detection products, traffic analysis, and planning and placement of intrusion detection solutions. Upon completion, students should be able to plan and implement intrusion detection solution for networks and host-based systems.(2016 FA)