CYB 202: Fundamental of Cyber Security II

 

 

learning Outcomes

After completion of the course, a student should be able to:

  1. describe basic operating system protection mechanisms, intrusion detection systems and formal models of security;
  2. explain the meaning of steganography, network and distributed system security, denial of service attack strategies, viruses and worms; and,
  3. demonstrate knowledge and understanding of transfer of funds, electronic voting, homeland cyber security policy, secure applications and government regulations of information technology.

Course Contents

Operating system protection mechanisms. Intrusion detection systems. Formal models of security. Cryptography. Steganography. Network and distributed system security. Denial of service (and other) attack strategies, worms, viruses. Transfer of funds/value across networks. Electronic voting. Secure applications. Homeland cyber security policy, and government regulation of information technology.