Securing the Technology Infrastructure
The course provides, current coverage of the technical aspects of computer security, including users, software, devices, operating systems, networks, and data. It reviews the evolving attacks, countermeasure activity in computing environments. It also covers best practices for preventing malicious code execution, using encryption, protecting privacy and legal implications, implementing firewalls, detecting intrusions, and discussion of ethical practices. Students will go beyond the technology to understand crucial management issues in protecting infrastructure and data. Prerequisite(s): Linux workstation experience and approval of the department chair. Corequisite(s): ITM 323.