CSIS 461 Technical Aspects of Computer Security

This course applies the tools, tactics, techniques, and technical procedures used to defend systems and networks against a wide range of cyber-attacks.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Course Guide

View this course’s outcomes, policies, schedule, and more.*

View Course Guides <!–

Requires a student login to access.

–>

*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.


As more and more computing systems rely on networking technology, computer security is becoming more important. In addition, the skills to break software and penetrate network defenses are more widely available. As such, what is needed is for students with high moral character to learn the techniques used by attackers, both to test the systems for which they are responsible and also to construct solid defenses to protect against these attacks. This course will teach students these skills, along with the necessary moral and ethical backdrop.


Textbook readings and lecture presentations

No details available.

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (2)

Discussions are collaborative learning experiences. Therefore, the student will create a thread in response to the provided prompt for each discussion. Each thread must be at least 300 words and demonstrate course-related knowledge. In addition to the thread, the student will reply to the threads of at least 2 classmates. Each reply must be at least 100 words. At least 1 citation must be included in each thread and reply. Current APA formatting is required for any citations.

CybrScore Lab Assignments (6)

Using a virtual lab environment, the student will complete computer security lab assignments that will give him or her an opportunity to demonstrate mastery of the lessons learned during the assigned or previous module.

Quizzes (4)

Each quiz will cover the Learn material for the Module: Week in which it is assigned as well as the preceding Modules: Weeks. Each exam will be open-book/open-notes and will have a time limit of 45 minutes. Each quiz will contain a variety of multiple-choice and true/false questions.

Quiz: Final Exam

The student will complete a comprehensive Quiz: Final Exam which will cover all the material from the course. This exam will be open-book/open-notes, contain a variety of multiple-choice and true/false questions and have a time limit of 2 hours.


Top 1% For Online Programs

Have questions about this course or a program?

Speak to one of our admissions specialists.