INFO 6613: Systems Security Administration
|Dr. Corey Schou or James Frost
||Office location: Bldg 5, Rm. 415
|Preferred email: Schou@mentor.net
||Office Phone: 282-4893
|Secondary email: Schou@cob.isu.edu
||Office hours: By Appointment
This course provides students with a security administrator's view of the diverse management concerns associated with administering and operating an automated information system facility with minimized risk. Students will examine both the technical and non-technical security issues associated with managing a computer facility. The technical side of the course is designed to provide in-depth information on the software and hardware components of Information Security and Assurance. Topics covered include: firewall configurations, hardening Unix and NT servers, Web and distributed systems security, and specific implementation of security models and architectures. Non-technical aspects of the course includes an examination of the policies, procedures and staffing functions necessary to organize and administrate ongoing security functions in the organization. Subjects include security practices, security architecture and models, continuity planning and disaster recovery planning.
PREREQUISITES: INFO 4411/5511, INFO 5519 (6 Credits), INFO 5585
CNSSI 4013 -- Competencies for this course are found on this website. Students may qualify at entry (1-274), intermediate (275-543) and advanced (544-624) levels.
Students should submit the competencies form for evaluation prior to the examinations.
CNNSSI 4013 (available at https://www.cnss.gov/CNSS/openDoc.cfm?UXIkIZ5CeIYLJEPb+yGCwQ==)
As a result of participation in INFO 6613, the successful student will be able to
- Work closely with the Information Systems Security Officer (ISSO) to ensure the information systems or network is used securely.
- Participate in the Information Systems Security incident reporting program
- Assist the ISSO in maintaining configuration control of the systems and applications software.
- Advise the ISSO of security anomalies or integrity loopholes.
- Administer, when applicable, security mechanisms of an IS or network
In addition, given various scenarios and typical situations containing information systems security issues, the successful student, depending on prior experience, will be able to
- Describe and apply the appropriate actions to manage and administer an IS in a secure manner. To be acceptable, the description and application must be in accordance with applicable IA regulations, policies, and guidelines. (Entry Level)
- Explain and implement the appropriate actions to manage and administer an IS in a secure manner. To be acceptable, the explanation and implementation must be in accordance with applicable IA regulations, policies, and guidelines. (Intermediate Level)
- Verify that the appropriate actions are implemented to manage and administer an IS in a secure manner. To be acceptable, verification must be in accordance with applicable IA regulations, policies, and guidelines. (Advanced Level)
Advanced Masters courses and preliminary doctoral courses.
As part of the development of our advanced masters courses, we have decided to use the content structures from our undergraduate courses; however, these advanced courses will require either experience in the Information Systems field or a student must take the 400/500 level course as a prerequisite. These courses will be research oriented rather than ‘book learning’ focused. The students will be expected to perform both physical research, where appropriate, as well as literary review and analysis.
Grading Scale for INFO 6613
|Research Project Defense
All material on this site is copyright unless otherwise noted.
Please respect the authors rights by requesting permission for use and ensuring proper attribution and credit.