Information Security (CERT)
You are viewing the 2020-2021 catalog. VIEW CURRENT CATALOG
Summary
The Information Security certificate provides students with the necessary knowledge in information security principles and practices and an understanding of how information security functions in an organization from both business and technology aspects. The program will engage students with a thorough review of viruses, worms, backdoors, Trojan horses, Rootkits, and other threats. Students will analyze malware in order to understand the infection, propagation, and deception mechanisms of these attack vectors. It will also focus on risk assessment to identify reasonably foreseeable internal and external risks to the security, confidentiality and integrity of user information and assess the sufficiency of any safeguards in place to control these risks. |
Catalog Year
2020-2021
Degree
Certificate
Total Credits
12
Locations
Mankato
Program Requirements
Prerequisites to the Major
Students planning to take CIS 460 must have basic knowledge of or experience in data communications and networking (equivalent of CIS 360). Students planning to take CIS 442 must have basic knowledge of or experience in databases (equivalent of CIS 340).Major Restricted Electives
Choose 12 Credit(s).
Security concepts and mechanisms; security technologies; authentication mechanisms; mandatory and discretionary controls; cryptography and applications; threats; intrusion detection and prevention; regulations; vulnerability assessment; information assurance; forensics; anonymity and privacy issues; disaster recovery planning, legal issues and ethics. Prereq: 3.0 or higher grade in IT 210 or in an approved subsitute is required.
Prerequisites: CIS 121 with 3.0 or higher grade or an approved substitute.
This course covers science and study of methods of protecting data, and designing disaster recovery strategy. Secure database design, data integrity, secure architectures, secure transaction processing, information flow controls, inference controls, and auditing. Security models for relational and object-oriented databases.Variable
Prerequisites: CIS 350, CIS 440
Covers information warfare principles and technologies. Information warfare concepts; protocols, authentication, and encryption; network attack techniques, methodologies, and tools; network defense; malware; Trojan worms, viruses, and malicious code; electronic crimes and digital evidence.
Prerequisites: CIS 350
Advanced coverage of data communication, networking and security protocols. Topics: data transmission methods, error detection and recovery, flow control, routing, security issues and performance analysis of existing and emerging protocols for secure communication. Fall, Spring
Prerequisites: CIS 360