The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help

    Saint Joseph's College: Online Programs
   
 
  Dec 17, 2017
 
 
    
2017-2018 Saint Joseph’s College Online
[Add to Portfolio]

IT 350 - Security II


This course provides a more in-depth look into the techniques, processes, and implementation behind strong cybersecurity. Students will learn general security, network security, operating system security, methods for testing security, IP security, wireless security, how to use firewalls and gateways, guard against hackers and viruses, build authentication skills, and encryption techniques.

Prerequisites & Notes
IT 100 and IT 250

Assignment Overview
Synchronous term-based course with ten weekly assignments and a final project

Course Learning Objectives
Upon completion of this course, you should be able to do the following:

  • Describe the general concepts of Information security.
  • Identify various security measures that can be applied at different levels (OS level, DB level, Network level, etc.) to protect the systems and data.
  • Explain various cryptographic methods, encryption systems and implementations.
  • Identify emerging security products and solutions and their application and benefits.
  • Discuss the changing threat landscape and the measures to keep up with the bad guys.


Credits: 3



[Add to Portfolio]