Useful Information

----- The Basics -----

Module 1 : Introduction to Information Assurance

In this module we'll introduce terms and establish foundational information needed to understand future modules.


Module Concepts: Computer security defined; information assurance defined; basic verbiage; the CIA triad; risk management and controls; threats and vulnerabilities


Supporting Material:
Assignments:
Module 2 : The Basic Tools of Security: Identification, Authentication, and Cryptography

Now that we've established what computer security is, we will continue with our foundational work by exploring the three basic tools of computer security.


Module Concepts: Authentication, Access Control, Basic Cryptography


Supporting Material:
Assignments:
Module 3 : Security in Software


Module Concepts: Buffer overflows, malware, and counter measures


Supporting Material:
Assignments:

----- Networking and OS Security -----

Module 4 : Operating System Security

A security engineer must understand the inner workings of what they need to protect. In this section we will examine operating systems, what they need to do, and where their weak points are at.


Supporting Material:
Assignments:
Module 5 : The Web - User Side / Network Security

This module will explore a very big topic. I expect it will take at least two weeks and thus, I've divided it up into three parts. Take your time getting through this section. Network security is a complex problem and a huge part of the information assurance field.


Supporting Material:
Assignments:

----- Misc Topics -----

Module 6 : Database Security

Databases make up the backbone of most businesses now. So, it is only natural that we take the time to explore issues specific to databases and they are more complex than you might think.


Supporting Material:
Assignments:
Module 7 : Privacy, Law, and Ethics

For this module, we'll explore three interesting but less technical topics. I'm also going to give you a break this week from lab assignments. Focus on making progress on your deep dive.


Supporting Material:
Module 8 : Computer Crime and Digital Forensics

The counter part to privacy is digital forensics. Let's explore that deeper, along with computer crime in general. We'll skip the lab assignment this week as well. Make some progress on that deep dive. I'm excited to see what you do.


Supporting Material: