Read our cookies policy and privacy statement for more information.
×Denver, Colorado•
This course illustrates how information assets can be subjected to internal and external attacks and presents techniques used to secure them from unauthorized access. Topics include sub-networking for guest and vendor access; managing mixed operating system environments; data at rest and data in-transit; database inference; network management systems and security; information assurance tools and techniques. Restrictions: Restricted to graduate majors and NDGR majors with a sub-plan of NBA within the Business School, graduate majors within the College of Engineering, Design and Computing, PHCS PhD majors and PhD majors.
Units: 3.0
Hours: 3 to 3