Introduction to Information Security (XNTA 0910)

Course Outline & Reading Guide

Saturday, March 8, 2003 Surviving Security*:
  Read Chapters 1 thru 5,  
  Chapter 13 pp 294-298,  
  & Chapters 16 and 18.  

Also begin reading
The Cuckoo's Egg**
  1.
 
Overview & Background
 
KNOW YOUR ENEMIES
  2.
 
Hackers, Viruses, & Other Enemies
 
BUILD THE SECURITY INFRASTRUCTURE
  3.IS Requirements, Risks, & ROI
  4.IS People & Organizations
  5.IS Policies, Standards, & Procedures
  6.
 
Personnel Security & IS Audits
 
APPLY THE SECURITY TECHNOLOGY
  7.Security Models & Architecture
  8.Cryptography
  9.Access Control
Saturday, March 15, 2003 Surviving Security*:
  Read Chapters 6, 7, 8,  
  10, and 11.  Also
  Chapter 12 pp 279-283.  
 10.Physical Security
 11.Network Security
 12.Intrusion Detection
          = Mid-term Exam
 13.UNIX Security
 14.Windows Security
Saturday, March 22, 2003 Surviving Security*:
  Read Chapters 9, 13, 14,  
  15, 17, and 19.  Also  
  Chapter 12 pp 263-278.  

Finish reading
The Cuckoo's Egg**
 15.Application Security
 16.Vulnerabilities Management
 17.
 
Remote Access & Wireless Security
 
COMPLETE THE SECURITY INFRASTRUCTURE
 18.Site IS Management
          = Project Presentations
 19.Continuity of Business
 20.
 
Incidents, Forensics, & Prosecution
 
 21.Trends, Opportunities, & Conclusions
          = Final Exam


 *Surviving Security:  How to Integrate People, Process, and Technology.
  Andress, Mandy.  Sams Publishing, Indiana, 2002.
www.survivingsecurity.com

**The Cuckoo's Egg:  Tracking a Spy Through the Maze of Computer Espionage.
  Stoll, Cliff.  Pocket Books, New York, 1989-1990.
Home Page Home Page Next Page Next Page
Copyright © 2002 by Daniel W. Hancock.  All Rights Reserved.