College Catalog
SEC Info Systems Security
Courses are listed by course discipline prefix, number, course title, credit hours, and, in parentheses, the number of lecture, laboratory and/or work experience/clinical hours, and the semester the course is offered. Local and state prerequisites and corequisites are identified by superscript L for localL and S for stateS. The symbol “AND” indicates the course will be offered “As Needs Demand.”
UGETC represents the Universal General Education Transfer Component as described in the Comprehensive Articulation Agreement (CAA).
Prefix | Number | Title | Hours | Semester |
---|---|---|---|---|
SEC | 110 | Security Concepts | 3 (2-2) | Fall, Spring |
Prerequisite: None
Corequisite: None
This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.(2013 SP)
Prefix | Number | Title | Hours | Semester |
---|---|---|---|---|
SEC | 160 | Security Administration I | 3 (2-2) | Spring |
Prerequisite: None
Corequisite: None
This course provides an overview of security administration and fundamentals of designing security architectures. Topics include networking technologies, TCP/IP concepts, protocols, network traffic analysis, monitoring, and security best practices. Upon completion, students should be able to identify normal network traffic using network analysis tools and design basic security defenses.(2016 FA)
Prefix | Number | Title | Hours | Semester |
---|---|---|---|---|
SEC | 210 | Intrusion Detection | 3 (2-2) | Fall |
Prerequisite: None
Corequisite: None
This course introduces the student to intrusion detection methods in use today. Topics include the types of intrusion detection products, traffic analysis, and planning and placement of intrusion detection solutions. Upon completion, students should be able to plan and implement intrusion detection solution for networks and host-based systems.(2016 FA)