CYBR 202: Information Security II

Subject
Cybersecurity
Credits 5
Quarter Offered
Winter,
Summer
Continues building a foundation in network security. Learn theory and concepts, cryptography, encryption algorithms, communication and remote access, policy and incident response. This is the second course in a series of two to prepare for the CompTIA Security+ certification. Passing a professional IT certification requires many additional hours of study before and after the course lecture. Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional certification.
Outcomes
  • Define security protocols and their use in the industry
  • Demonstrate configuring rights, permissions, and policies by utilizing templates and groups to comply with confidentiality, integrity, and availability
  • Demonstrate use of industry standard tools to monitor systems and networks, conduct audits, and perform risk assessment practices assessing vulnerabilities as conducted in industry
  • Describe access control models such as MAC, DAC, RBAS, and ABAC, plus methodologies such as implicit deny and job rotation as used in the industry
  • Describe cryptography concepts, encryption algorithms, and hashing basics as implemented by industry standards
  • Discuss physical security and authentication models and components as to industry standard
  • Identify the importance of user education by applying methods and techniques to defeat social engineering attacks
  • Prepare for and successfully complete industry certification.
Distribution
Career Training