Upon the completion of the course, the student should be able to:
Explain security landscape, assessing risks, identifying risks, prioritizing risks, drafting security requirements, and ethical issues in security analysis.
Describe different file system ownership and access rights, directory access rights, Executable files and malwares, sharing and protecting files, security control for files, file security controls, and patching security flaws.
Explain the least privilege concepts, file permission flags, access control list, Microsoft Windows ACLs, and monitoring cyber system security.
Recognize how authentication, authorization, and identification techniques are used to protect the network.
Explain elements of symmetric cryptography for file encryption.
Create cryptographic keys (Private and Public keys) using software applications for data protection.
Demonstrate and apply volume encryption, block ciphers, and key management
Explain computer networking, inspection tools, use of different network devices, and attacks on internet network protocols
Demonstrate the network security process that applies cryptography services at the network transfer layer.
Explain the use of protocol analysis for network traffic investigation