Skip to main content
CS406: Information Security
0%
Focus Mode is ON. Click ‘X’ at right bottom to close it.
Previous
Course data
General
Course Syllabus
Unit 1: Introduction to Information Security
1.1: The History and Evolution of Information Security
1.2: Confidentiality, Integrity, and Availability – The CIA Triad
1.3: Threats, Vulnerabilities, and Risks
1.4: The Risk Management Process
1.5: The Incident Response Process
1.6: Security Control
1.7: Defense-in-Depth
1.8: Human Behavioral Risks
1.9: Security Frameworks
Unit 1 Assessment
Unit 2: Threats and Attack Modes
2.1: Threat Terminology
2.2: Types of Attacks
2.3: Spoofing Attacks
2.4: Social Engineering
2.5: Application Attacks
2.6: Web Application Attacks
2.7: Malware attacks
2.8: Denial of Service (DoS) and Distributed Denail of Service (DDoS)
Unit 2 Assessment
Unit 3: Cryptographic Models
3.1: Cryptographic History
3.1.1: The Caesar Cipher
3.1.2: One-Time Pads
3.2: Goals of Cryptography
3.3.1: Symmetric Key Algorithms
3.3.2: Asymmetric Key Algorithms
3.3.3: Hashing Algorithms
3.4.1: Symmetric Key Algorithms
3.4.1.1: DES
3.4.1.2: 3DES
3.4.1.3: AES
3.4.1.4: Ciphers (RC4, RC5, RC6, Blowfish, Twofish)
3.4.2: Asymmetric Key Algorithms
3.4.2.1: RSA
3.4.2.2: DSA
3.4.2.3: Pretty Good Privacy (PGP)
3.4.2.4: GPG
3.4.2.5: Diffie-Hellman
3.4.2.6: Elliptic-Curve Cryptography
3.5: Hashing Algorithms
3.5.1: Digital Certificates
3.5.2: Message Digest 5 (MD5)
3.5.3: Secure Hash Algorithm (SHA-0, SHA-1, SHA-2, and SHA-3)
3.5.4: Hashed Message Authentication Code (HMAC)
Unit 3 Assessment
Unit 4: Access Control
4.1: Access Control
4.2: Access Control Terminology
4.3: Access Control Models
4.3.1: Mandatory Access Control (MAC) and Discretionary Access Control (DAC)
4.3.2: Role-Based Access Control (RBAC)
4.3.3: Rule-Based Access Control (RB-RBAC)
Unit 4 Assessment
Unit 5: Identification and Authentication
5.1: Identification
5.2: Authentication Types
5.3: Human Authentication Factors
5.4: Authentication Forms
5.5: Authentication Protocols: RADIUS, TACACS+, PAP, CHAP, MS-CHAP, and EAP
5.6: Single Sign-On (SSO)
5.7: Public-Key Infrastructure (PKI)
Unit 5 Assessment
Unit 6: Network Security
6.1: Network Security Design
6.2: Firewalls
6.3: Wireless Networks
6.4: Network Protection
6.5: Web Security
Unit 6 Assessment
Unit 7: Operating System (OS) Security
7.1: OS Hardening
7.2: OS Protection Methods
7.3: OS Firewalls
7.4: OS Security Tools
Unit 7 Assessment
Unit 8: Intrusion Detection and Prevention Systems
8.1: Intrusion Detection Systems (IDS)
8.2: Network Intrusion Detection Systems (NIDS)
8.3: Host-based Intrusion Detection Systems (HIDS)
8.4: Intrusion Prevention Systems (IPS)
8.5: System Information and Event Management (SIEM)
Unit 8 Assessment
Unit 9: Privacy Laws, Penalties, and Privacy Issues
9.1: Electronic Data Privacy Protection
9.2: Global Privacy Laws
Unit 9 Assessment
Study Guide
Course Feedback Survey
Certificate Final Exam
Next
Side panel
Course Catalog
All categories
Arts and Humanities
Art History
Communication
English
Philosophy
Business Administration
Computer Science
English as a Second Language
Professional Development
Business and Communication
College Success
Computer and Information Technology
General Knowledge for Teachers
Writing and Soft Skills
Science and Mathematics
Biology
Chemistry
Mathematics
Physics
Social Science
Economics
Geography
History
Political Science
Psychology
Sociology
Home
Specialization Programs
Specialization Programs
Help
Getting Started
Help Center & FAQ
Search
Search
Search
Search
Close
Toggle search input
You are currently using guest access
Log in
Course Catalog
Collapse
Expand
All categories
Arts and Humanities
Art History
Communication
English
Philosophy
Business Administration
Computer Science
English as a Second Language
Professional Development
Business and Communication
College Success
Computer and Information Technology
General Knowledge for Teachers
Writing and Soft Skills
Science and Mathematics
Biology
Chemistry
Mathematics
Physics
Social Science
Economics
Geography
History
Political Science
Psychology
Sociology
Home
Specialization Programs
Collapse
Expand
Specialization Programs
Help
Collapse
Expand
Getting Started
Help Center & FAQ
Expand all
Collapse all
Open course index
CS406: Information Security
Topic
Name
Description
Course Syllabus