03-14-2013, 08:09 AM
How did I miss these updates? CIS 344 might be considered a natural science since 5 other CIS courses offered by TESC are considered natural sciences. At least I sort of got one right: Computer Security; but, it's not for the course I thought it would be for. The non-technical track is only 1/3 law, so I'm not really getting that evaluation. I think the business track more aligns with Computer Security since it talks about risk management and business continuity. The technical track is closer to Network Security. Send them an email that looks something like this:
ACE description for Computer Security for IT Professionals
TESC description for Network Security
ACE description of Computer Security for Business Professionals
TESC description for Computer Security
I'll have to do this in two posts.
ACE description for Computer Security for IT Professionals
Quote:Upon completion of the course the student will be able to summarize commonly utilized means of securing organization's networks, including firewalls, intrusion detection systems, and intrusion prevention systems; examine tools and utilities that can be used to monitor and observe a network; summarize policies and best practices that can be used to monitor and observe a network; review computer technologies before introducing the associated challenges and advantages of these technologies to computer forensics; describe forensics and discuss the specific role of digital forensics in forensic science; explain digital forensics by discussing methods of presenting question answers to a variety of audiences; review basic terms found in a full discussion of information security; describe the study of confidentiality, integrity and access control and an introduction to several access control models; discuss layered architecture model used in the design and study of the Transmission Control Protocol/Internet Protocol (TCP/IP); summarize the common offensive techniques used by attackers targeting IT networks; identify vulnerabilities unique to operating systems and some solutions and best practices to guard against the exploitation of such vulnerabilities; review of the general concepts of cryptography, different types of cryptographic algorithms and the pros and cons of these different types; describe the fundamental concepts of developing secure software; review concepts in secure software design and testing and emphasize how these techniques are used to create more robust and reliable software; summarize commonly used software development methodologies; and introduce a secure software development methodology for an in depth look at how a secure process typically occurs.
TESC description for Network Security
Quote:Network Security (CAP-385) 1.00 s.h.
Design a secure network based on business, management, and network factors; implement user and group policies to tighten security, secure computers and plan a network for internet access; plan, deploy, manage and monitor servers; encryption and secure sites.
ACE description of Computer Security for Business Professionals
Quote:Upon completion of the course, the student will be able to summarize concepts for cyber incident management, as well as an overview of the cyber incident management process; describe preparation phase of cyber security incident management; know reactive cyber incident management activities; identify protecting and restoring systems that have been compromised by cyber security incidents including incident containment, identification, eradication, and recovery; specify cyber incident proactive and post services, legal issues, and human resource issues; summarize the practice of Business Information Continuity; describes continuity plans; review training that should be given to employees, and teaches how to derive maximum productivity from current and new staff; describe the technical side of Business Information Continuity; recognize threats to Business Information Continuity; review inventory, personnel, and the previous continuity plan; summarize risk management, the application of risk management practices to information systems, and how information systems risk management relates to Business Information Continuity; explain information technology components found in most organizations and an evaluation of their relative importance; summarize risk identification and common hazards; apply risk and hazard frameworks to common cyber threats; define risk quantification, including quantitative and qualitative methods; discuss risk control which involves risk detection, risk limitation, risk recovery, and risk plan monitoring; and discuss organizational security policies, how to apply them to an organization's practices, and how to successfully comply with industry standards such as COBIT, FISMA, PCI, and others.
TESC description for Computer Security
Quote:Computer Security (CIS-344) 3.00 s.h.
This course covers knowledge and understanding associated with the usage of systems security theory, techniques, and practice. The course focus is on applying knowledge to dealing with real-world security issues. Areas covered: RISK Assessment--organization, systems & data asset evaluation, threat characteristics, risk assessment, and dealing with risk. RECOVERING FROM INFORMATION SERVICE INTERRRUPTION--Recoverable storage management, business continuity planning, disaster management. INFORMATION AND SYSTEM SECURITY--telecommunications, database security, cryptography, operating systems, microcomputers and local area net- works, and physical security. SECURITY IN SYSTEM DESIGN--system security objectives and functions, data integrity assurance, life-cycle approach. SECURITY MANAGEMENT--policy setting, implementation, & administration, security awareness, information ethics, personnel issues, etc.
I'll have to do this in two posts.
Graduate of Not VUL or ENEB
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc