Readings

Week 1: Introduction to Information Security

    1. Read “Principal of Information System Security: History”
    2. Read “Secure System Development Life Cycle Standard”
    3. Read “The Role of Chief Security Officer is More Vital than Ever”

Week 2: The Need for Security

    1.  Visit The Motherlist Glossary Of Cybersecurity And Cybercrime Definitions and read the first item under the Motherlist.
    2. Watch Cybercrime: Online scams

Week 3 – 4: Legal, Ethical, and Professional Issues in Information Security

    1. Read “ITS Security Policies”
    2. Watch “You Are the Product: Targeted by Cambridge Analytica on Facebook”
    3. Read “Privacy versus Security”
    4. Read and try the tool of “Cover Your Track”
    5. Watch Cybercrime: Mass surveillance

Week 5 – 6: Risk Management

    1. Read S. Government Accountability Office: “Information Security Practices of Leading Organizations
    2. Read Risk Management for Novel Coronavirus (COVID-19)
    3. Read the week 8 materials – Managing security risks

Week 7: Physical Security

    1. Read The Importance of Physical Security in the Workplace
    2. Read Physical Security and Why It Is Important from SANS reading room

Week 8 – 9: Cryptography I

    1. Read “Introduction to Crypto-terminologies”
    2. Read “Substitution Cipher”
    3. Read “Difference between Monoalphabetic Cipher and Polyalphabetic Cipher”
    4. Read “Vigenère Cipher”

Week 10 – 12: Cryptography II & III

    1. Read section 1 to section 3 from Gary C. Kessler’s “An Overview of Cryptography: Public-Key Cryptography
    2. Read “RSA Cryptography: The Algorithm Keeping Us Safe Online”
    3. Read RSA Algorithm in Cryptography
    4. Read the Diffie-Hellman algorithm
    5. Hands-on exercise with the CrypTool

Week 13: Planning for Security

    1. Read “Contingency Planning Guide for Federal Information Systems”

Week 14: Selective Security Topics (e.g. Microsoft Windows Server 2008, Cloud security, etc.)

    1. Read “How to Enable or Disable Windows Security in Windows 10”
    2. Read “What is Cloud Security”
Skip to toolbar