|
|
IS-2810/TEL-2813: Security Management (Spring-05)(IS-2810 is the new IS number for this course) Thursdays 6:00 - 8:50PM Chvrn 135 (Changed to First floor conference room in SIS building) |
|||
Instructor James Joshi
Contact Info
Tel:412-624-9982 GSA (Update Feb 8) Homework (Due: Jan 26) (Papers assigned)
(Presentations: Feb 3)
(Due: Feb 16) (Papers assigned) (Extended Due: Feb 19)
(Due: Feb 16) (Papers assigned) (Extended Due: Feb 19)
Homework 4 Comment on Pittsburgh’s “Information Technology Security Plan – Security Architecture Strategy and Roadmap fro 2004-2006” (Some of you did it as part of HW 3)
Projects 1 (Groups of Two) Due date April First Week) Topics [1] Computer Forensic [2] Network Vulnerability Assessment [3] Systems Vulnerability Assessment [4] Intrusion Detection [5] Security Evaluation based on Common Criteria
Projects 2 (Possibly Two Groups)
Seminar (click) Lectures Lecture 1
Lecture 2
Lecture 3 Lecture Notes
Lecture 4-6 (Chap 4, 5 and 6)
Guest Speaker Matt Tolbert, CISSP CISO-University of Pittsburgh (will bring material)
Lecture 7, 8
Lecture 9
Lecture 10
Lecture 11
Lecture 12
|
Course
Description This course covers issues related to administration and management of security of enterprise information systems and networks. Topics include intrusion detection systems, vulnerability analysis, anomaly detection, computer forensics, application logging, auditing and data management, risk management, contingency planning and incident handling, digital immune systems, and alarms and responses. The course will study in detail principles and tools related to these topics. The course will also cover security standards, evaluation and certification process; security planning, ethical and legal issues in information; privacy, traceability and cyber-evidence; Course Objective The course is aimed at imparting knowledge and skill sets required to assume the overall responsibilities of administration and management of security of an enterprise information system. The course is aimed at developing capabilities to do the following:
Prerequisites
Students who have taken either of the following courses will benefit the most from this course:
If you have not taken either of these courses, have not taken other courses, and want to take this course, please talk to the instructor. The course will include laboratory components hence basic knowledge of system environments (Window and Unix) will be essential. The students are expected to have adequate programming skills (C, C++ or Java). Course Material There is no one book that covers all the topics considered in this course. All the relevant books are still being checked to see if one can be used as the main text book. Here are some reference books that will be recommended for the course.
Introduction to Security Management (3 Weeks)
Security Analysis and Safeguards (tools and techniques) (6 Weeks)
Standards and Security Certification Issues (4 Weeks)
National and International Security Laws and Ethical Issues (2 Weeks)
Grading (Tentative)
If you are having a disability for which you are or may be requesting an accommodation, you are encouraged to contact both your instructor and the Office of Disability Resources and Services (DRS), 216 William Pitt Union (412-648-7890/412-383-7355) as early as possible in the term. DRS will verify your disability and determine reasonable accommodations for this course. |
||||
|