Topics covered include: Security Fundamentals; Business Needs; Legal, Ethical and Professional Issues; Risk Management; Policies, Standards and Practices; Security Technology: Firewalls and VPNs; Security Technology: Intrusion Detection, Access Control, and Other Security Tools; Cryptography; Physical Security; Implementing Information Security; Information Security Credentials, Security and Personnel, and Maintaining Information Security.


H3 { margin-top: 0in; margin-bottom: 0in; direction: ltr; widows: 2; orphans: 2; }H3.western { font-family: "Arial Narrow",serif; font-size: 10pt; }H3.cjk { font-family: "Times New Roman"; font-size: 10pt; }H3.ctl { font-family: "Calibri"; font-size: 10pt; }P { margin-bottom: 0.08in; direction: ltr; widows: 2; orphans: 2; }P.western { font-family: "Calibri",serif; font-size: 11pt; }P.cjk { font-size: 11pt; }P.ctl { font-family: "Calibri"; font-size: 11pt; }A:link { color: rgb(0, 0, 255); }

CSI420 Web Computing

Project II

This course covers the following topics: Overview of computer networks, overview of computer security, system vulnerabilities (administrative, application, and network), cryptography, digital signatures, authentication protocols, network management.