| Saturday, March 8, 2003 | Surviving Security*: Read Chapters 1 thru 5, Chapter 13 pp 294-298, & Chapters 16 and 18. Also begin reading The Cuckoo's Egg** | |
| 1. | Overview & Background | |
| KNOW YOUR ENEMIES | ||
| 2. | Hackers, Viruses, & Other Enemies | |
| BUILD THE SECURITY INFRASTRUCTURE | ||
| 3. | IS Requirements, Risks, & ROI | |
| 4. | IS People & Organizations | |
| 5. | IS Policies, Standards, & Procedures | |
| 6. | Personnel Security & IS Audits | |
| APPLY THE SECURITY TECHNOLOGY | ||
| 7. | Security Models & Architecture | |
| 8. | Cryptography | |
| 9. | Access Control | |
| Saturday, March 15, 2003 | Surviving Security*: Read Chapters 6, 7, 8, 10, and 11. Also Chapter 12 pp 279-283. | |
| 10. | Physical Security | |
| 11. | Network Security | |
| 12. | Intrusion Detection | |
| = Mid-term Exam | ||
| 13. | UNIX Security | |
| 14. | Windows Security | |
| Saturday, March 22, 2003 | Surviving Security*: Read Chapters 9, 13, 14, 15, 17, and 19. Also Chapter 12 pp 263-278. Finish reading The Cuckoo's Egg** | |
| 15. | Application Security | |
| 16. | Vulnerabilities Management | |
| 17. | Remote Access & Wireless Security | |
| COMPLETE THE SECURITY INFRASTRUCTURE | ||
| 18. | Site IS Management | |
| = Project Presentations | ||
| 19. | Continuity of Business | |
| 20. | Incidents, Forensics, & Prosecution | |
| 21. | Trends, Opportunities, & Conclusions | |
| = Final Exam | ||
*Surviving Security: How to Integrate People, Process, and Technology.
Andress, Mandy. Sams Publishing, Indiana, 2002.
www.survivingsecurity.com
**The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.
Stoll, Cliff. Pocket Books, New York, 1989-1990.
|
|
Next Page |