Upon the completion of the course, the student should be able to:

  • Explain security landscape, assessing risks, identifying risks, prioritizing risks, drafting security requirements, and ethical issues in security analysis.
  • Describe different file system ownership and access rights, directory access rights, Executable files and malwares, sharing and protecting files, security control for files, file security controls, and patching security flaws.
  • Explain the least privilege concepts, file permission flags, access control list, Microsoft Windows ACLs, and monitoring cyber system security.
  • Recognize how authentication, authorization, and identification techniques are used to protect the network.
  • Explain elements of symmetric cryptography for file encryption.
  • Create cryptographic keys (Private and Public keys) using software applications for data protection.
  • Demonstrate and apply volume encryption, block ciphers, and key management
  • Explain computer networking, inspection tools, use of different network devices, and attacks on internet network protocols
  • Demonstrate the network security process that applies cryptography services at the network transfer layer.
  • Explain the use of protocol analysis for network traffic investigation