• ""
  • ""

Welcome To CSIS 490

Why you should take this class (or why this class may change your life!):

At the end of this course, you will be able to:

  1. Examine the architecture of a cyber system to discover vulnerabilities
  2. Develop and use already existent tools for pen testing and vulnerability assessment
  3. Explain main Information Security components and security lifecycle
  4. Discover different types of network intrusions based on their key features
  5. Describe and evaluate the effectiveness of firewalls and VPNs
  6. Develop rules for Intrusion Detection/Prevention Systems and evaluate these using statistical Receiver Operating Characteristic (ROC) curves
  7. Use scanning techniques for information gathering
  8. Analyze Denial of Service and other common attacks
  9. Evaluate and propose defense mechanisms
  10. Develop a buffer overflow attack and propose defense mechanisms
  11. Point out non-secure programming practices and substitute these with secure programing and input sanitizing technique
  12. Understand key concepts: HTTPS, SSL, IPSec, IEEE 802.11 wireless security and hypothesize their weaknesses
  13. Articulate laws and policies, ethical issues on cybersecurity
  14. Design risk assessment, understand security team roles
  15. Explain the role of management in development, maintenance, and enforcement of cybersecurity policy
  16. Formulate social engineering scenarios to test the preparedness of their organization
  17. Identify and propose security controls
  18. Recognize human factors in security and the value of education and training