Read our cookies policy and privacy statement for more information.
×Denver, Colorado•
This course concentrates on the identification of information assets and the techniques used to protect them from unauthorized access. Topics include laptops, desktop and server vulnerabilities; network vulnerabilities; extranet and intranet management; incident response and management; web site and web services management; virtualization in the data center; and cloud computing security. Restrictions: Restricted to graduate majors and NDGR majors with a sub-plan of NBA within the Business School, graduate majors within the College of Engineering Design and Computing, PHCS PhD majors and PhD majors.
Units: 3.0
Hours: 3 to 3