The following four courses comprise the Information Security minor or certificate. Three of the courses are specific to Information Security concepts and tools, and the fourth course covers networking concepts. Please read the descriptions of each course below for more information.
- ISM 4320 - Information Systems Security. Designed to educate the students with proactive security knowledge and skills, this course is a show-and-tell about the holes in network and security systems, providing illustrations of attacks and methods to prevent them. Students get exposure to how vulnerability assessment is performed in an organization or a network of computers, how to assess and minimize the risks, and how to implement solid defense technology and matched human responsible behavior.
- ISM 4323 - Management of Information Assurance and Security.* This course covers planning, development, and implementation of a comprehensive information security program in an organization and considers the management, legal, ethical, and personnel frameworks of such program. By the end of this course students will be able to: (1) Examine and review information security program in management and systems development contexts, (2) Recommend security policies and organizational practices, (3) Perform risk assessment (4) Develop contingency plan, (5) Establish security processes, (6) Implement security models and frameworks (7) Develop and implement training and awareness programs
- ISM 4324 - Computer Forensics.* This course concentrates on the principles and the techniques of computer forensic investigation and prosecution of computer and cyber crimes. Aligned with the objectives of the International Association of Computer Investigative Specialists (IACIS) certification, the course covers digital evidence controls, principles of data acquisition, computer forensic analysis, recovering of deleted, corrupted, images and other files, as well as network and email forensics. A very interesting lab work and lab sessions empower students with hands-on experience with cutting edge forensic tools and applications, such as Forensics Tool Kit (FTK) suite, X-Ways Forensics, Wireshark, and many others, all used in Law Enforcement and corporate investigations.
- ISM 4220 - Business Data Communications. Students are introduced to the fundamental network building blocks, principles and technologies underlying modern business telecommunications and computer networks. Students will learn how computers communicate across networks, what protocols they use, how data transfer is managed as well as basics of system administration and network configuration.
*Computer Crime (CJE 4668) or Special Topics (CCJ 4934) with an emphasis on corporate security may be substituted for either of these courses.