A detailed examination of the techniques, tools, and technologies used to support the protection of an organization’s electronic perimeter. The course will examine the evaluation, selection, deployment, and administration of firewall, virtual private network, intrusion detection and prevention systems, and other applications used to guard organizational information from external attacks.
Notes: Offered as an online course.
|Number of credit hours per week||3|
|Presence of students||On-campus and on-line|
Prerequisite: Business Majors: Sophomore GPA Requirement and a grade of “C” or better in ISA 3200; Non-business Majors: A grade of “C” or better in ISA 3200 and permission of the Coles College of Business.