CIS 2750 - Securing Information Systems
|
![]() |
|
Link to Publisher's Site |
|
Lesson
1: Chapter 1, Introduction to Computer Security; Chapter 2,
Networks and the Internet
Lesson
2: Chapter 3, Cyberstalking, Fraud, and Abuse; Chapter 4,
Denial of Service Attacks
Lesson
3: Chapter 5, Malware; Chapter 6, Techniques Used by Hackers
Lesson
4: Chapter 7, Industrial Espionage in Cyberspace; Chapter 8,
Encryption
Lesson
5: Chapter 9, Computer Security Technology; Chapter 10,
Security Policies
Lesson
6: Chapter 11, Network Scanning and Vulnerability Scanning;
Chapter 12, Cyber Terrorism and Information Warfare
Lesson
7: Chapter 13, Cyber Detective; Chapter 14, Introduction to
Forensics; Chapter 15, Cybersecurity Engineering
Lesson
8: review and final
There are two exams for this course, a midterm and a final.
Other useful web sites:
CompTIA Security+ page
Dept of Homeland Security, Cybersecurity
page
US-CERT Cyber Security Tips
Krebs on Security
One
Look - a great site for looking up any word
What
Is...? - great for looking up technical terms
MalwareBytes - a fine product for scanning for
obstinate viruses
Copyright © 2023 Steve Vincent
URL:
http://stevevincent.info/index.html
Legend: Blue Links are unvisited, Burgundy Links are visited.
: lecture
section notes
: lab
section notes
:
assignments, outlines
:
review/study guides
: handouts
: WWW
references