Administrative Details

Slides:



Advertisements
Similar presentations
CSE115 Introduction to Computer Science I
Advertisements

1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
CS1203 SCCC/ATS COURSE SYLLABUS Introduction to Computer Concepts and Applications Revised 8/16/2014 Online 7/14 revision Ed Hall Instructor.
Jan Welcome to the Course of Data Structures and Algorithms.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
Understanding Networked Applications: A First Course Introduction to course by David G. Messerschmitt.
Introduction to Computers. Michael R. Izzo
CSc 160 Overview of Fundamentals of Computer Programming II Spring (SO1) 2004.
MIS 4600 Ethical Hacking & Network Defense January 12, 2010 Abdou Illia, Ph.D
Computer Science – Information Literacy Seminar ODUCS Information Literacy.
Management Information Systems BSAD 141, Spring 2014 Dave Novak Course Introduction.
A First Course in Information Security
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2013 Prof. Mohammad A. Mikki Room I215.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Introduction to CPSC Introduction to CPSC Information Technology.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Introduction to Course MMIS 656 Web Design Technologies.
Introduction to Databases Computer Science 557 September 2007 Instructor: Joe Bockhorst University of Wisconsin - Milwaukee.
ICS104 Computer Programming Second Semester 2012/2013 ICS1041 Tuwailaa Alshammari College of Computer Science & Engineering University.
Data Warehousing/Mining 1 Data Warehousing/Mining Comp 150DW Course Overview Instructor: Dan Hebert.
IT Semester 1 Course Introduction IT Portfolio IT 1140 ( Semester 1) Hong Kong Baptist University IT 1140 – IT Portfolio – Course Introduction.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
SCHILLER INTERNATIONAL UNIVERSITY
Software Systems Engineering Rob Oshana Southern Methodist University EMIS 7312.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Software Systems Engineering Rob Oshana Southern Methodist University EMIS 7312.
Information Systems Security Course Introduction.
Course Overview for Compilers J. H. Wang Sep. 20, 2011.
Presented by : Dr. Sarah Mustafa Eljack Babiker
BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,
COP4610 Principles of Operating Systems Prof. Robert van Engelen Department of Computer Science Florida State University.
January 10, Csci 2111: Data and File Structures Instructor: Nathalie Japkowicz Objectives of the Course and Preliminaries.
ENGINEERING 1301 INTRODUCTION TO ENGINEERING Lecture 1: Introduction to Introduction to Engineering.
COURSE OUTLINE AZHAR HAMID IAS2143 DATABASE SYSTEM UniselFaculty of Computer Science and Information Technology.
ACC 542 homework / acc542homeworkdotcom. ACC 542 Entire Course ACC 542 Week 1 Individual Assignment Computer Information System Brief ACC 542 Week 2 Learning.
COMP9024: Data Structures and Algorithms Course Outline Hui Wu Session 1, 2016
Advanced Programing practices
COMP9024: Data Structures and Algorithms
Syllabus Introduction to Computer Science
Introduction Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe.
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
ECE 671 – Lecture 1 Introduction.
Computer Science 102 Data Structures CSCI-UA
CMGT 582 Competitive Success-- snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 RANK Lessons in Excellence-- cis333rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CMGT 582 Education for Service-- snaptutorial.com
CIS 333 RANK Education for Service-- cis333rank.com.
CMGT 582 STUDY Education for Service--cmgt582study.com.
CMGT 432 Education for Service-- tutorialrank.com
Introduction: course outline
Basic Synchronization Principles
ECE 671 – Lecture 1 Introduction.
IS4550 Security Policies and Implementation
Three major projects: There will be a midterm covering the material presented during the first half of the semester a final covering the material presented.
Computer Security Fundamentals
INFS 522 – Computer Systems Concepts
IS4680 Security Auditing for Compliance
Nonlinear Dynamic Control Systems
Basic Synchronization Principles (Continue)
Chapter NINE: Staying On Course to Your Success
Advanced Programing practices
ICS201 Introduction To Computing II
Introduction: course outline
CPSC 465: Design and Analysis of Algorithms
ENGINEERING 1301 INTRODUCTION TO ENGINEERING
Introduction: Some Representative Problems
Wednesday, October 21st Dr. Dennis S. Kubasko, Jr. Associate Professor
Presentation transcript:

Administrative Details Chapter 0 Professor: Oberta A. Slotterbeck (Obie) Computer Science Department Hiram College obie@hiram.edu

Textbook Textbook: Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison Wesley, ISBN 0-321-51294-4

Administrative details Homework exercises, discussion of them in class - 15% Lab exercises - started in class and written up as lab reports - 35% Test 1 - 25% Test 2 - during finals week at assigned time - 25%

Goals of the Course After completing this course, successfully, you will be able to correctly 1. Use computer security terminology 2. Analyze and articulate the goals of computer and information security 3. Recognize modern threats and mitigation techniques 4. Discuss security needs and requirements 5. Articulate the need for security and auditing 6. Describe and recognize basic cryptographic techniques and some modern implementations

Goals - continued 7. Identify and use secure programming techniques 8. Articulate the security needs of operating systems, databases, and networks and how they are protected. 9. Design and administer security policies 10. Identify ethical and moral issues related to security. 11. Identify the different security tools that may be used to protect system

Class web site: http://cs.hiram.edu/~obie/cpsc35200 There will be a password protected web site established. It’s use and access will be described in class later. Be sure you read and understand the college policies with respect to your academic work