Professional Documents
Culture Documents
Course Outline: Information Systems Security 1 Students Learning Outcomes
Course Outline: Information Systems Security 1 Students Learning Outcomes
The learning outcome is students shall be able to understand what are the common threats
faced today, what are the foundational theory behind information security, what are the basic
principles and techniques when designing a secure system, how to think adversarially, how
today's attacks and defenses work in practice, how to assess threats for their significance, and
how to gauge the protections and limitations provided by today's technology
Course Topics
a. Controls
b. Control methodologies
c. Access control issues
Cryptography
a. Definitions
b. History
c. Cryptography fundamentals
d. Symmetric key cryptosystem fundamentals
e. Asymmetric key cryptosystem fundamentals
f. Key distribution and management
g. Public key infrastructure definitions and concepts
1
Business continuity planning (BCP) and disaster recovery planning (DRP)
Physical security
a. The elements involved in choosing a secure site, its design and implementation
b. The methods for securing a facility against unauthorized access
c. The methods for securing either the equipment or its contained information against
theft
d. The environmental and safety measures needed to protect personnel, and the facility,
and its resources
Recommended books
1. Certified Information Systems Security study guide, sixth edition, James M. Stewart,
Mike Chapple, Darril Gibson
2. Fundamentals of Information Systems Security, second edition, David Kim and
Michael G. Solomon
Course Policies