项目作者: rtimbro185

项目描述 :
Syracuse University, Masters of Applied Data Science - IST 623 Introduction to Information Security
高级语言:
项目地址: git://github.com/rtimbro185/syr_mads_ist623_intro_information_security.git


Ryan Timbrook (Graduate Student - Course Work Repository)

LinkedIn Profile

Syracuse University, Masters of Applied Data Science

IST 623 Intro to Information Security - Winter 2020

SYLLABUS

  1. **SYRACUSE UNIVERSITY School of Information Studies**
  2. **IST - 623 Introduction to Information Security**

Description:
This graduate course (IST623, Introduction to Information Security) is intended to teach fundamental elements in information security and introduce the key areas of security challenges, countermeasures, and applications. The course will focus on a comprehensive understanding of information security rather than an in-depth analysis of a particular area. Topics include security properties, vulnerabilities, cryptography, public key infrastructure (PKI), security policies, authentication, access control, security protocols, network security, cyber attacks, and security management. Students will also have research opportunities and hands-on experiences in information security. This is the only required course for the Certificate of Advanced Study (CAS) in Information Security Management (ISM).

Additional Course Description:

Learning Objectives:
• Explain o The fundamental elements in information security.

o In-depth security knowledge and skills in the research areas that they selected.

• Demonstrate o The hands-on ability to analyze security properties using various security services and tools.

o The ability in collaboration with other colleagues to perform team projects in information security.

• Develop specialty

o On a specific area of information security in their further study, extending the contents learned from this course.

SYRACUSE UNIVERSITY School of Information Studies

IST623-Week3-ClassObjectives_1650465472965.pdf
IST623-Week3-LimitationsInBLP_1650465473024.pdf
IST623-Week3-OtherSecurityModels_1650465473060.pdf
IST623-Week3-RBACmodel_1650465473097.pdf
IST623-Week3-SecurityModel_1650465473105.pdf
IST623-Week3-Summary_1650465473218.pdf
IST623-Week4-ApplyToComputers_1650465473269.pdf
IST623-Week4-BasicTransformations_1650465473314.pdf
IST623-Week4-BruteForceAttack_1650465473340.pdf
IST623-Week4-ClassObjectives_1650465473347.pdf
IST623-Week4-CryptographyOverview_1650465473486.pdf
IST623-Week4-DictionaryAttack_1650465473575.pdf
IST623-Week4-DoubleDES_1650465473739.pdf
IST623-Week4-FeistelCipher_1650465473793.pdf
IST623-Week4-SKC-Summary_1650465473802.pdf
IST623-Week4-Summary_1650465473849.pdf
IST6232UJan2020AgendaWeek1_1650465473856.pdf
IST6232UJan2020AgendaWeek3_1650465473882.pdf
IST623_Week1_ClassObjectives_1650465473889.pdf
IST623-Week10-AnalysisOnProxy_1650465471999.pdf
IST623-Week10-ApplicationLevelGateway_1650465472091.pdf
IST623-Week10-LimitationsOfFirewalls_1650465472131.pdf
IST623-Week10-PacketFilteringFirewalls_1650465472154.pdf
IST623-Week10-PacketFilteringRuleR1_1650465472187.pdf
IST623-Week10-PacketFilteringRuleR2_1650465472233.pdf
IST623-Week10-PacketFilteringRuleR3_1650465472283.pdf
IST623-Week10-PrerequisiteUnderstanding_1650465472313.pdf
IST623-Week10-Summary_1650465472321.pdf
IST623-Week10-WhatIsAFirewall_1650465472332.pdf
IST623-Week2-ClassObjectives_1650465472342.pdf
IST623-Week2-MAC_1650465472514.pdf
IST623-Week2-SecurityPolicyLevels_1650465472573.pdf
IST623-Week2-SecurityPolicyPrinciples_1650465472609.pdf
IST623-Week2-SourcesOfSecurityPolicies_1650465472748.pdf
IST623-Week2-Summary_1650465472775.pdf
IST623-Week2-WhatIsSecurityPolicy_1650465472804.pdf
IST623-Week3-AccessMatrix_1650465472826.pdf
IST623-Week3-Access_Control_Models_1650465472838.pdf
IST623-Week3-BLPmodel_1650465472867.pdf
IST623-Week3-BLPrules_1650465472921.pdf
Group_2_IST623_Presentation_1650465470739.pdf
3DES_1650465471404.pdf
IST623-Week1-CheckWhereWeAre_1650465471525.pdf
IST623-Week1-InformationSecurityAreas_1650465471596.pdf
IST623-Week1-SecurityCycle_1650465471629.pdf
IST623-Week1-SecurityProperties_1650465471683.pdf
IST623-Week1-SecurityTrade-offs_1650465471715.pdf
IST623-Week1-SecurityTrends_1650465471814.pdf
IST623-Week1-Summary_1650465471931.pdf
IST623-Week1-Todayvs.Before_1650465471939.pdf
IST623-Week10-AnalysisOnPacketFilteringFirewalls_1650465471984.pdf
Group_2_IST623_Presentation_1650465471137.pptx
IST623-2U-Assignment_3-Pub-SKC-PKC_1650465469993.pdf
IST623-2U-Assignment_4-Pub-TLS-IPsec_1650465470011.pdf
IST623-Assignment_5-Indiv-Firewalls_1650465470018.pdf
Ryan_Timbrook_Assignment_5_1650465470039.pdf
IST623Lab1IdentifyingAndRemovingMalwareJan2020_1650465470073.pdf
Ryan_Timbrook_Lab_1_1650465470153.pdf
IST623Lab2UsingEncryptionToEnhanceCI3.0UpdatedJan2020_1650465470259.pdf
Ryan_Timbrook_Lab_2_1650465470345.pdf
IST623Lab3UsingWiresharkAndNetWitnessInvestigatorToAnalyzeWirelessTraffic3.0UpdatedJan2020_1650465470423.pdf
Ryan_Timbrook_Lab_3_1650465470624.pdf
IST_623_Syllabus_1650465469344.pdf
RyanTimbrook_Intro_Bio.docx_1650465469519.pdf
Week2_Assignment_1_1650465469586.pdf
IST623-2U-Assignment_2-Indiv-BLP-Updated_1650465469734.pdf
Ryan_Timbrook_Assignment_2_1650465469979.pdf
IST623_Assignments_template_1650465469876.doc