CSEC1110 - Fundamentals of IT Security

Credits
3 (2/1/0)
Description
Security is an important component of information technology. This course introduces industry-recommended security guidelines and controls. Students will practice implementing several examples of controls and encrypting data in transit and for storage.
Competencies
  1. Carry out information technology policies within an organization that include privacy, legal and ethical considerations.
  2. Evaluate the purpose and function of cybersecurity technology, identifying the tools and systems that reduce the risk of data breaches while enabling vital organization practices.
  3. Apply appropriate tools and concepts to minimize the risk to an organization's cyberspace to address cybersecurity threats.
  4. Identify the characteristics of a risk management approach for responding to and recovering from a cyber attack on systems which contain high-value information and assets such as email.
  5. Implement common standards, procedures and applications used to protect the confidentiality, integrity and availability of data and information systems.
  6. Analyze human facets that enable the exploitation of computing-based systems.
  7. Evaluate various security breaches and their effect on business operations.
  8. Summarize how governmental and environmental regulations affect an organization's environment.
  9. Perform common malware analysis procedures on mobile and desktop computer systems.
Degrees that use this course

Cybersecurity

Associate of Applied Science (AAS)

Cybersecurity

Certificate

Information Technology

Associate of Science (AS)