Programs
November 27, 2025
Course Visits: 294
30 Hours
Course outline
This course includes the following:
Introduction to Information Security
Threats and Attack Modes
Cryptographic Models
Access Control
Identification and Authentication
Network Security
Operating System (OS) Security
Intrusion Detection and Prevention Systems
Privacy Laws, Penalties, and Privacy Issues
Course Learning Outcomes
Explain the fundamental principles of information security.
Identify major information security threats and their modes of attack.
Describe cryptographic models and how they are used to provide security.
Explain the principles of access control models.
Illustrate methods of identification and authentication such as passwords, pins, biometrics, and tokens.
Describe network security methods including network designs, firewalls, wireless encryption methods, tunneling, and network protection tools.
Describe operating system (OS) hardening, malware protection, firewalls, and security tools.
Explain intrusion detection systems (IDS) and intrusion prevention systems (IPS), and the advantages and disadvantages of each system, and synthesize current privacy laws and the implications of violations on organizations
Course Duration: (30 Hours)