The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help

    Saint Joseph's College: Online Programs
   
 
  Dec 15, 2017
 
 
    
2017-2018 Saint Joseph’s College Online
[Add to Portfolio]

IT 250 - Security I


This course covers the essential principles of information security and incorporates activities, methods, and procedures to help reach secure solutions. Students will learn mandatory access control, discretionary access control, integrity, availability, confidentiality, inspection and protection of information assets, detection of and reaction to threats to information assets, examination of pre-and post-incident procedures, technical and managerial responses, identify threats, vulnerabilities, and controls, encryption, code, security management, and law, privacy and ethics.

Prerequisites & Notes
IT 100

IT 110

Assignment Overview
Synchronous term-based course with ten weekly assignments and a final project

Course Learning Objectives
Upon completion of this course, you should be able to do the following:

  • Demonstrate knowledge of the history, characteristics and components of information security.
  • Identify and prioritize information assets and threats to those assets.
  • Define an information security strategy and architecture, including disaster recovery planning.
  • Identify, plan for and respond to intruders in an information system.
  • Identify various industry standards and organizations in the security field.
  • Describe legal, ethical and public relations implications of security and privacy issues.


Credits: 3



[Add to Portfolio]