Prerequisites: COSC 110 or equivalent course, as approved by instructor
An introduction to the theory and concepts of host computer security. Topics include security and policy guidelines, attack strategies and attacker profiles, users and groups security, file systems and security, integrity management, cryptography basics, back-up utilities, auditing and logging, and strategies for defending user accounts. A practical hands-on course.
Prerequisites: COSC 110, and MATH 121 or 125, and MATH 214, 216, or 217, or equivalents
Data communications, computer network architectures, functions of various network layers, communication protocols, internetworking, emerging high-speed networks.
Prerequisite: IFMG 250 or BTST 273 or COSC 110
A study of fundamental local area networking concepts. A detailed study of the basics of local area network (LAN) technology. Comparative study of commercially available LAN systems and products. Features a hands-on laboratory implementation of a LAN. Cross-listed as IFMG 352. Either course may be substituted for the other for D/F repeats but may not be taken for duplicate credit.
Prerequisite: COSC 316 and either COSC 345 or COSC/IFMG 352
Explores mechanisms for protecting networks against attacks. Emphasizes network security applications that are used on the Internet and for corporate networks. Investigates various networking security standards and studies methods for enforcing and enhancing those standards.
Prerequisites: COSC 310, MATH 122 or 123
Fundamental concepts of encoding and/or encrypting information, cryptographic protocols and techniques, various cryptographic algorithms, and security of information are covered in depth.
Prerequisites: COSC 110 or equivalent programming course, junior standing or permission of instructor
Takes a detailed, hands-on approach to the use of computer technology in investigating computer crime. From network security breaches to child pornography, the common bridge is the demonstration that particular electronic media contains incriminating evidence. Using modern forensics tools and techniques, students learn how to conduct a structured investigation process to determine exactly what happened and who was responsible, and to perform this investigation in such a way that the results are useful in criminal proceedings. Real world case studies will be used to provide a better understanding of security issues. Unique forensics issues associated with various operating systems including Linux/Windows operating systems and associated applications are covered.
Prerequisites: COSC 316 or permission of instructor
This course explores the various issues pertinent to maintaining acceptable levels of Information Security within organizations. It addresses issues involved in administering and managing information security systems. The course is intended to raise awareness of information security issues across organizations.
Prerequisites: COSC 300, COSC 310, COSC 319, and COSC 380. See catalog for clarification.
Positions with participating companies provide students with paid experience in computer science under the supervision of the companies and faculty. Requirements include on-site consultations, university consultations, progress reports, oral presentation, and a final cumulative paper. An internship can be completed as a 12 credit unit over a minimum of 23 weeks or in six credit units each over a minimum of 12 weeks. Writing-intensive course. * Internship is an information assurance course when placed in an information assurance role.
Prerequisites: CRIM 101 or CRIM 102
Addresses the cybersecurity threat from a more comprehensive standpoint. Students will be challenged to recognize and understand security concerns from multiple perspectives, ranging from the insider threat to threats involving the actual physical components. Exposure to a design methodology, associated system components modules, and basic security principles is featured. Students will also be exposed to the private and public responses to computer security problems, including the insider threat, domestic and foreign terrorism, and the number of unique computer crimes and solutions to deal with these crimes. The importance of a sound security policy in the overall management of any organization will be addressed.
Examines the scope of cybersecurity and its impact upon today’s system of criminal justice. Topics to be studied include cybercrime and the Bill or Rights, computer-based economic crime, electronic commerce, ethical challenges, and the Computer Fraud and Abuse Act. Included will be an analysis of the legal considerations facing law enforcement and cybersecurity professionals who deal with the problem of discovering, investigating, and prosecuting cybercrime.
Prerequisite: IMFG 352
Introduces the security concepts, operating systems security, network security, database, web server, and communication security. Public and common practices of procedures and regulations regarding e-commerce security are explored. Writing information security policies is introduced.
For further information on Computer Science Cyber Security-related courses and the entire Computer Science curriculum, please check the Computer Science Department website.
For further information on Criminology Cyber Security-related courses and the entire Criminology curriculum, please check the Criminology and Criminal Justice Department website.
For further information on Political Science Cyber Security-related courses and the entire Political Science curriculum, please check the Political Science Department website.
Fraud, Waste, and Abuse Hotline
© 2007–17 Indiana University of Pennsylvania
1011 South Drive, Indiana, Pa. 15705 | 724-357-2100