13.07.2015 Views

Indexed Adobe PDF (Spring 2011-Full Version) - SUNY Orange

Indexed Adobe PDF (Spring 2011-Full Version) - SUNY Orange

Indexed Adobe PDF (Spring 2011-Full Version) - SUNY Orange

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cyber SecurityCyber Security(Applied Technologies)CFR 221—Computer Forensics2 lect., 2 lab; 3 cr.This course will introduce the student to theaccepted methods of properly conducting a computerforensics investigation, beginning with a discussion ofethics while mapping to the objectives of theInternational Association of Computer InvestigativeSpecialists (IACIS) certification. Students shouldhave a working knowledge of hardware and operatingsystems (OSs) to maximize their success on projectsand exercises throughout the text. Specific topicscovered include: computer forensics andinvestigations as a profession, understandingcomputer investigations, the investigator's office andlaboratory, current computer forensics tools,processing crime and incident scenes, digital evidencecontrols, working with windows and DOS systems,Macintosh and Linux boot processes and diskstructures, data acquisition, domputer forensicanalysis, recovering image files, network forensics, e-mail investigations.Prerequisite: CIT 112, CIT 118CFR 222—Network Forensics2 lect., 2 lab., 3 cr.This course will introduce the student to theaccepted methods of properly conducting a forensicsinvestigation over a network. Students should have aworking knowledge of networks, hardware, andoperating systems (OSs) to maximize their success onprojects and exercises throughout the text. Specifictopics covered include: network forensicsinvestigation overview, the Microsoft networkstructure, processing crime and incident scenes, digitalevidence controls, data acquisition, forensic analysis,recovering image files, the registry structure, registryevidence, presenting the results.Prerequisite: CIT 203, CFR 221Readings and cases are provided to further enable astudent to master the text material while bringingrealistic security issues to the forefront. Readingsfrom current periodicals in the information securitywill also be reviewed.Prerequisite: CIT 116CSS 224—Network Perimeter Security2 lect., 2 lab, 3 cr.This course introduces firewalls and the networksecurity components that can work together toprovide an in-depth defensive perimeter around alocal area network. Accordingly, this course examinesfirewalls in context with the other elements needed foreffective perimeter security as well as security within anetwork. These include packet filtering,authentication, proxy servers, encryption, bastionhosts, virtual private networks, log file maintenance,and intrusion detection systems. Different firewallconfigurations will also be examined.Prerequisite: CIT 203CSS—Cyber Crime Investigations2 lect., 2 lab, 3 cr.This course is designed to provide the student withfoundational knowledge of common techniques usedby most cyber crime investigators. Proceduralapproaches and documentation will be covered.These procedures identify the accepted approaches toprotect a digital crime scene/incident, process thecollected data/information, ensure and document theintegrity of the entire process. The cyber crimeinvestigative procedures will be scrutinized to identifypotential problems. The student will be instructed inhow the procedures and outcomes of thoseprocedures create supporting documentation for alegal case.Prerequisite or concurrent enrollment in CFR 222CSS 223 Information Security3 cr.This course is designed to familiarize the studentwith the foundation utilized by most organizations indeveloping a management framework that willimplement a secure, predictable and dependablesystem throughout the organization. In addition, itwill help students preparing to take the CertifiedInformation Systems Security Professional Exam(CISSP). This is a first course in the introduction andstudy of Information security.A broad view of the field is provided along withenough detail to facilitate an understanding of thetopic as a whole. All pertinent terminology is covered,along with the field’s history and an overview of howto implement and manage an information securityplan.<strong>Spring</strong> <strong>2011</strong>www.sunyorange.edu183

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!