Saturday, March 8, 2003 | Surviving Security*: Read Chapters 1 thru 5, Chapter 13 pp 294-298, & Chapters 16 and 18. Also begin reading The Cuckoo's Egg** | |
1. | Overview & Background | |
KNOW YOUR ENEMIES | ||
2. | Hackers, Viruses, & Other Enemies | |
BUILD THE SECURITY INFRASTRUCTURE | ||
3. | IS Requirements, Risks, & ROI | |
4. | IS People & Organizations | |
5. | IS Policies, Standards, & Procedures | |
6. | Personnel Security & IS Audits | |
APPLY THE SECURITY TECHNOLOGY | ||
7. | Security Models & Architecture | |
8. | Cryptography | |
9. | Access Control | |
Saturday, March 15, 2003 | Surviving Security*: Read Chapters 6, 7, 8, 10, and 11. Also Chapter 12 pp 279-283. | |
10. | Physical Security | |
11. | Network Security | |
12. | Intrusion Detection | |
= Mid-term Exam | ||
13. | UNIX Security | |
14. | Windows Security | |
Saturday, March 22, 2003 | Surviving Security*: Read Chapters 9, 13, 14, 15, 17, and 19. Also Chapter 12 pp 263-278. Finish reading The Cuckoo's Egg** | |
15. | Application Security | |
16. | Vulnerabilities Management | |
17. | Remote Access & Wireless Security | |
COMPLETE THE SECURITY INFRASTRUCTURE | ||
18. | Site IS Management | |
= Project Presentations | ||
19. | Continuity of Business | |
20. | Incidents, Forensics, & Prosecution | |
21. | Trends, Opportunities, & Conclusions | |
= Final Exam |
*Surviving Security: How to Integrate People, Process, and Technology.
Andress, Mandy. Sams Publishing, Indiana, 2002.
www.survivingsecurity.com
**The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.
Stoll, Cliff. Pocket Books, New York, 1989-1990.
Home Page | Next Page |