• Investigative Research
  • One of the greatest challenges facing a security professional is testing whether the network, services and applications in use by an organization are secure. Knowing where vulnerabilities are likely to reside, how attackers are likely to exploit them, and how to go about searching for weaknesses are invaluable skills. This subject will introduce students to the methods, tools, planning and implementation of security assessment of networks and software. Particular attention will be paid to penetration testing, ethical hacking, and software security assessment.
  • School of Computer Studies course template.
  • E-commerce remains one of the fastest-growing aspects of business in recent years, and there is a great demand for people who can plan and implement complete, database-driven web applications that run in a variety of different environments. Focusing on technologies popular on the Linux/Unix platform, this subject will provide the student with the skills and knowledge required to create and maintain commercial-quality web sites suitable for database-driven business transactions. The student will learn to build dynamic web applications using popular web programming languages, while leveraging the power of a SQL database. Coverage will include application and web site security.
  • This course teaches the maintenance and administration of a UNIX server using Linux. Students will learn to install and upgrade the operating system software, set up user accounts, back up and restore files, install and configure servers, monitor network traffic and recover from system disasters.
  • This course will introduce students to the historical perspective and principles of information security. Students will gain an understanding of the importance of security within and between organizations, including the ongoing threats and vulnerabilities on networks. Students will learn and utilize effective policies and procedures for secure contingency planning on both Linux/Unix and Windows operating systems and will create and implement secure network designs using models.
  • This course will enable students to measure security policy compliance. The course will teach students to reflect on the need to protect IT assets daily. Students will learn that a security audit is a continual effort to improve data protection. The course will demonstrate that an audit measures the organization's security policy and provides an analysis of the effectiveness of that policy within the context of the organization's structure, objectives and activities. Students will learn to use tools as part of the audit process, and how to develop organized, consistent, and accurate data collection.