Information Assurance for Cybersecurity
Topics to be covered include metrics, planning and deployment; identity and trust technologies; verification and evaluation, and incident response; human factors; regulation, policy languages, and enforcement; legal, ethical, and social implications; privacy and security trade-offs; system survivability; intrusion detection; and fault and security management. The learning outcomes for this course are as follows:
- Recognize the general purpose and goals of the online course,
- Explain the need and role of information assurance (IA) in corporate and national security,
- Discern the threats, vulnerabilities, and risks that an information system is exposed to,
- Analyze the Information assurance needs of an organization,
- Identify models to express the IA needs of an organization,
- Identify measures to express the efficacy of an information system’s assurance capability,
- Identify privacy and security regulations of a given organization,
- Discern the legal, ethical, and social implications of an organization’s IA strategies,
- Identify and analyze potential vulnerabilities in a system,
- Explain techniques for detecting intrusions (internal or external),
- Identify techniques for a system to survive any potential attacks,
- Match IA needs of an organization with available technologies.
Course Material
Students in this course have completed a number of activities including an final course project paper, weekly discussion board posts, weekly homework assignments, several technology and cybersecurity journals, and two exams.
Information-Assurance-Final-Report