CRN: 71914

Credits : 4

This course gives a broad overview of Computer Security and Information Assurance primarily in the corporate environment. The course has two parts: Lecture/discussion related to information security basics and a laboratory / project component in which students learn technology related security. Course materials include topics such as types of attacks, hacker techniques, legal and privacy issues, security policy, information security best practices and so on. Students also learn security technologies related to three areas: operating systems, Networks and Web, and e-commerce. The course has a strong laboratory component in which students experiment with various practical computer security solutions in a virtual environment.  

Goals and Objectives

The student will learn the impact of network security on video, voice, and data networks including understanding the elements of a crypto system, digital certificates, and more. Students will understand how crypto can be used, strengths and weaknesses, issues that have to be addressed (e.g. key management), etc. There is a strong focus on information assurance as it applies to the corporate network environment. This class also explores current security issues as reported in online media such as the New York Times, Wall Street Journal, and Washington Post (to name a few). Pace University provides free access to the New York Times and you can find information on this by going to . We will explore weekly security issues found in the press.

  • AIT107  Computer Applications
  • AIT109  Global Telecom Essentials
  • MAT125  Technical Math I

    Course Materials

    Course Topics
    The Treat Environment - It’s out there! Basic Terminology Malware Social Engineering Hackers and attacks Cyberwar and Cyber Terror  Week 1 Quiz Homework = Thought questions relating to this weeks topics Lab Project = Visit several security related websites to research current information. 
    Planning and Policy - Someone has to plan, right? Understand the critical need for proper security management planning and the resulting policy. This includes risk analysis, compliance laws and regul  Week 2 Quiz Homework = Research PCI-DDS control objectives and report back Lab Project =Using, download and explain the top 20 critical controls as defined by 
    Cryptography – Keeping secrets! Terminology Simple Ciphers Symmetric Key Encryption Public Key Encryption SSL/TLS IPSec  Week 3 Quiz Homework =Research the Enigma system used in WW2 and explain the basics of the system Lab Project = Run the Enigma Project Simulator and report your results 
    Secure Networks – The BEST kind DoS Attacks ARP poisoning Ethernet Security Wireless Security  Week 4 Quiz Homework = SSL vs TLS Which is better and why Lab Project = Security Pro+ Lab 7.2.5 Secure a switch 
    Access Control - It’s all about WHO has access Physical Access / Security Passwords Cards and Token Biometric authentication Cryptographic Authentication Directory servers, Full Identify Mgmt  Week 5 Quiz Homework = Explain FFR and list six identities for yourself and the password implications Lab Project = Run the password simulation project and report results 
    Mid Term Exam Preparation and review  Proctored Midterm Examination covering weeks one through six 
    Firewalls - How do we keep the bad guys out? Packet Filtering NAT Proxy Firewalls IDS and IPS Antivirus Architectures Management Filter  Week 7 Quiz Homework = Reflection on course so far and its implications in your security world. Lab Project = Lab Project 6.7.4 Configure a firewall 
    Host Hardening - Keeping the OS safe Server Operating Systems Patches Managing users and groups Testing for Vulnerabilities  Week 8 Quiz Homework = Explain the security implications for netbooks vs PCs Lab Project = Visit the NSA! 
    Application Security - Avoid that weakest link! E-Commerce security Web browser attacks e-mail security VoIP security  Week 9 Quiz Homework = Buffer Overflow research Lab Project = Buffer Overflow lab 
    10  Data Protection - THE most important? Back up processes RAID Data Storage policies Database Security Data Loss prevention  Week 10 Quiz Homework = Apply real world examples of data protection to your life (PC and Smartphone) Lab Project = TBD 
    11  Incident and Disaster Response - Stuff happens Intrusion response process for major incidents IDS Business Continuity Planning IT Disaster recover  Week 11 Quiz Homework = Examine integrated log files to identify the point of attack Lab Project = Using software, recover actual deleted file content on your PC 
    12  Final Exam Preparation and review  Proctored Final Examination covering weeks 7 through 12 

    Proctor Information

    Proctor Information

    Please note that this course requires a proctor. Specific details are provided under the COURSE INFORMATION section in each Blackboard course.


    NACTEL:  You can read more about the proctoring program and steps needed to obtain an approved proctor by clicking on this link:  Proctoring Program.


    iPace:  You will use an online proctoring service called ProctorU, whereby you’ll be able to take your proctored exams from home. You will not need to physically go somewhere to take your online exams. Under the Course Information section of your Blackboard course you will find more information on this service and what you need to do to set up your account if you have not done so previously.

    Register Now
    Seidenberg School of Computer Science and Information Systems
      Program Info | Admission | Registration | Go To Class | Home Copyright © 2000
    All rights reserved