Welcome To CSIS 490
Why you should take this class (or why this class may change your life!):
- Cybersecurity jobs are abundant, there are two jobs for every qualified candidate!
- The job growth in cybersecurity is 18%, which is much higher than the national average of 7% (source: Bureau of Labor Statistics)
- Cybersecurity is an ever changing field, with highly satisfying career opportunities
At the end of this course, you will be able to:
- Examine the architecture of a cyber system to discover vulnerabilities
- Develop and use already existent tools for pen testing and vulnerability assessment
- Explain main Information Security components and security lifecycle
- Discover different types of network intrusions based on their key features
- Describe and evaluate the effectiveness of firewalls and VPNs
- Develop rules for Intrusion Detection/Prevention Systems and evaluate these using statistical Receiver Operating Characteristic (ROC) curves
- Use scanning techniques for information gathering
- Analyze Denial of Service and other common attacks
- Evaluate and propose defense mechanisms
- Develop a buffer overflow attack and propose defense mechanisms
- Point out non-secure programming practices and substitute these with secure programing and input sanitizing technique
- Understand key concepts: HTTPS, SSL, IPSec, IEEE 802.11 wireless security and hypothesize their weaknesses
- Articulate laws and policies, ethical issues on cybersecurity
- Design risk assessment, understand security team roles
- Explain the role of management in development, maintenance, and enforcement of cybersecurity policy
- Formulate social engineering scenarios to test the preparedness of their organization
- Identify and propose security controls
- Recognize human factors in security and the value of education and training