Readings

Week 1: Introduction to Information Security

    1. Read “Principal of Information System Security: History”
    2. Read “Secure System Development Life Cycle Standard”
    3. Read “The Role of Chief Security Officer is More Vital than Ever”

Week 2: The Need for Security

    1.  Visit The Motherlist Glossary Of Cybersecurity And Cybercrime Definitions and read the first item under the Motherlist.
    2. Watch Cybercrime: Online scams

Week 3 – 4: Legal, Ethical, and Professional Issues in Information Security

    1. Read “ITS Security Policies”
    2. Watch “You Are the Product: Targeted by Cambridge Analytica on Facebook”
    3. Read “Privacy versus Security”
    4. Read and try the tool of “Cover Your Track”
    5. Watch Cybercrime: Mass surveillance

Week 5 – 6: Risk Management

    1. Read S. Government Accountability Office: “Information Security Practices of Leading Organizations
    2. Read Risk Management for Novel Coronavirus (COVID-19)
    3. Read the week 8 materials – Managing security risks

Week 7: Physical Security

    1. Read The Importance of Physical Security in the Workplace
    2. Read Physical Security and Why It Is Important from SANS reading room

Week 8 – 9: Cryptography I

    1. Read “Introduction to Crypto-terminologies”
    2. Read “Substitution Cipher”
    3. Read “Difference between Monoalphabetic Cipher and Polyalphabetic Cipher”
    4. Read “Vigenère Cipher”

Week 10 – 12: Cryptography II & III

    1. Read section 1 to section 3 from Gary C. Kessler’s “An Overview of Cryptography: Public-Key Cryptography
    2. Read “RSA Cryptography: The Algorithm Keeping Us Safe Online”
    3. Read RSA Algorithm in Cryptography
    4. Read the Diffie-Hellman algorithm
    5. Hands-on exercise with the CrypTool

Week 13: Planning for Security

    1. Read “Contingency Planning Guide for Federal Information Systems”

Week 14: Selective Security Topics (e.g. Microsoft Windows Server 2008, Cloud security, etc.)

    1. Read “How to Enable or Disable Windows Security in Windows 10”
    2. Read “What is Cloud Security”