This course addresses concepts, principles, structures and standards used to design, monitor and secure operating systems, equipment, networks, databases, applications and controls that enforce various levels of availability, integrity and confidentiality. Coursework also focuses on security concepts that apply to application software development, addressing the software design and development environment and explaining software's critical role in providing information system security.
- Students will be able to evaluate the security assessments, policies, principles, and patterns that must be taken into consideration during the planning stages of a security project.
- Students will be familiar with the requirements for conducting secure code reviews and developing trusted code infrastructures.
- Students will be able to identify the key advantages of adding cryptographic services to a development environment.
- Students will be capable of evaluating the various security methodologies used to protect Operating Systems and provide secure intersystem communications.
- The student will be familiar with various security standards for supporting, developing, and maintaining these environments.
- Students will be able to analyze the inherent security issues that must be identified and addressed when developing, implementing, and maintaining applications and databases for a production environment.
- Students will be able to identify the various security components and controls that can be implemented to improve an organization's security objectives.
- Students will be able to identify the security and management issues that must be addressed and overcome in order to successfully design a security infrastructure that can adequately protect the organization's critical information assets and mitigate residual risks to an acceptable level.