Course DescriptionThis course addresses security architecture and design by considering case studies. In addition, the course will survey computer security frameworks, controls and objectives, and standards and pronouncements. Methods of threat risk assessment (TRA) will be reviewed, with particular emphasis on social and human factor engineering, hacker profiling, and risk management. Security policies and procedures, enforcement, and monitoring will also be covered. Students will apply what they learn in scenario-based exercises and projects.
Sample Course Outline
This course is fully online and asynchronous, meaning you typically will not have to be online at specific times. You will engage in course-related activities through online tools such as announcements, discussions, and email. Your course learning will be based on weekly module content and activities that you can go through independently. Note: there are still deadlines for assignment submissions, and you may be expected to participate in discussion board interactions with your peers on a regular basis.
Your instructor may also include occasional scheduled sessions for Q&As and other discussion activities, using web conferencing tools such as Zoom and Google Meet. More details will be included in your course outline available on the first day of class.
Knowledge of TCP/IP is recommended.
Students must have a Windows or Linux computer operating system; the Apple (Mac) operating system is not supported by this course.
Brampton Location: City of Brampton City Hall, West Tower, 51 George Street South (Room: WT-2A)
- Cybersecurity, Data Protection and Digital Forensics : Required Courses
- Science, Technology, Engineering, and Mathematics (STEM) : Electives (select 2)