13.07.2015 Views

SYNOPSES - Singapore Polytechnic

SYNOPSES - Singapore Polytechnic

SYNOPSES - Singapore Polytechnic

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>SYNOPSES</strong>also discuss the vulnerabilities and threatsof computer systems and Internet, and thecountermeasures available to contain them.ST2402IT Security Essentials IIIntroduces students to the fundamentalsconcepts of IT security and provides thegrounding to prepare students for morein-depth study of IT security topics. This is a2-part broad-based module where studentswill learn about Internet and system risks,threats and vulnerabilities. In part 2, themodule will give an overview of securityissues in 10 domains identified in CISSPcertification programme. Topics includebiometrics, physical security, applicationsecurity, personnel security, security models,management practices, etc. The overview isaimed at laying the foundation for subsequentmodules in Year 2.ST2403Java ProgrammingAims to teach students fundamentals ofcomputer programming and problem solvingusing Java Language as the programming tool.ST2501Network SecurityProvides students with a foundation onnetworking protocols, network security,and intrusion detection, hence securing theorganisation’s wired and wireless networkinfrastructure. The topics to be coveredwill include understanding of commoncommunication protocols on the Internet likeTCP/IP, HTTP, FTP, SMTP, as well as securityprotocols like SSL, and IPSEC. It will alsodiscuss network security threats and attacks,designing resilient networks, configuring ofnetwork components like firewall, setting upVirtual Private Network (VPN) and securedwireless connections.ST2502Computer Law & InvestigationExamines the criminal trial process andcases involving computer hacking, denialof service, modification of data, distortionand fabrication of information. Students willexamine the Computer Misuse Act, EvidenceAct and the Criminal Procedure Code whendealing with the various cyber threats issues.ST2503Database Security & ManagementTeaches students the security features andthe administration aspects of databases.Topics include managing user accountsand logins which allow the assignment ofdifferent levels of security to different users orgroups of users; database encryption; lockingmechanism for locking database objects atdifferent levels (such as table, record or fieldlevel). Students will also learn how to managedisaster discovery or loss of data in the caseof a successful attack by hackers or viruses orwhen the database is down. The advancedSQL commands related to the above willbe taught.ST2504Applied CryptographyTeaches students the principles andapplication of cryptography to secure dataand network. Different encryption algorithmsand techniques will be introduced, includingconventional and public-key cryptography,authentication and digital signatures.Students will learn to apply these conceptsto secure and authenticate electronic mailsand messages. Key management, digitalcertificates and public-key infrastructure willbe discussed to understand the deployment ofpublic-key cryptography.ST2505Ethical HackingAims to introduce students to penetrationtesting as a form of preventive measures toprotect important assets against hackers.Vulnerability testing, penetration tools andmethods will be examined. The studentswill learn how to secure systems fromsuch attacks.ST2506Operations SecurityProvides the students with an understandingof the concepts and issues of operationalsecurity in a data center. This includesthe configuration management, changemanagement and problem management indata center. Students will learn the generalpractice in using environmental control systemto manage the physical security of a datacenter, learn how to manage computer systemon security patching and monitoring securitybreaches. In addition, students will also learnabout managing secured backup operation inthe data center.ST2507Web Server & NetworkAdministrationIntroduces students to network theory,TCP/IP, domain name service (DNS), and theadministration of a Microsoft Windows server.In addition, they will learn how to configure,secure, and administer Internet applicationsusing Internet Information Services (IIS).ST260IT Security ProjectAims to provide students an opportunity tointegrate security technologies and conceptsthey have acquired from the course andexperience problem solving, communicationand working as a team to implementsecure IT solutions. The project could coversecured applications development, networkinfrastructure design, system integration ofsecurity solutions, network and data securityimplementation, and security administrationand management.ST2602Computer ForensicsAims to equip students with the fundamentalconcepts and techniques of computerforensics. Students will learn to preserve,acquire, analyse and present computer dataas evidence. The module will cover toolsand techniques of computer forensics, filestructures, data recovery, imaging and storageof electronic evidence.ST2603IT Security Policies & AuditingTeaches students the principles and practicesof IT auditing and the use of computerassisted auditing techniques (CAATs). Thismodule will enable students to identify andevaluate risks in different IT environment andto recommend controls to minimise thoserisks. Students will also learn the essentials ofsecurity policy development, risk assessmentsand security models.ST2604Application SecurityCovers the security issues in applicationdevelopment. It aims to give studentsan understanding of writing a securedapplication. Security models of programmingplatform like Java will be discussed. It willalso include topics on building secureapplications, eCommerce and web-basedapplication security, XML standards and webservices security.ST2605Disaster Recovery &Business Continuity PlanningProvides students with an understanding ofDisaster Recovery and Business ContinuityPlanning in the real world in particularwhere the business is dependent on Info-Communications Technology. The conceptsand issues of Disaster Recovery and BusinessContinuity Planning would also be covered.Students will be able to carry out the basicsteps in developing Disaster Recovery and326 <strong>Singapore</strong> <strong>Polytechnic</strong> Prospectus 2008/2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!