CSIS 3756 Security Design Mr. Mark Welton Course
1 / 1

CSIS 3756 Security Design Mr. Mark Welton Course

Author : tawny-fly | Published Date : 2025-08-16

Description: CSIS 3756 Security Design Mr Mark Welton Course Requirements Prerequisities CSCI 5806 or CSIS 3755 CIS 1525 or CIS 3718 Books For Course Material online in class and Safari Books Online will be used for this class What This Course IS

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "CSIS 3756 Security Design Mr. Mark Welton Course" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:CSIS 3756 Security Design Mr. Mark Welton Course:
CSIS 3756 Security Design Mr. Mark Welton Course Requirements Prerequisities: CSCI 5806 or CSIS 3755 CIS 1525 or CIS 3718 Books For Course: Material online, in class, and Safari Books Online will be used for this class What This Course IS NOT This is not a hacking course This is not an introduction course This is not a course where we will only deal will the operating system itself in isolation What This Course IS A course on operating system security concepts, techniques and applications including MS Windows and LINUX/UNIX platforms. Course Discription for CSIS 3756 In my opinion this can not be done by only looking at the operating system in isolation Today’s enterprise environments are comprised of multiple systems interconnected providing services to companies customers It is these interconnections that has changed the world of computing and security today It is all about the data! My opinion of what CSIS 3756 is… You can only learn how to design a security environment if you understand how it should be configured and how to determine what it is you are protecting You must understand risk and how it REALLY can be of use You need to understand how things REALLY work (theory is nice but you better know how to apply it) “A wise man walks with his head bowed, humble like the dust” Pilot episode of Kung Fu My opinion of what CSIS 3756 is… To be a security professional you must understand not only the previous concepts but you must understand that…. Lastly…. It is called penetration testing Penetration testers have permission to test the systems hackers don’t Security is the process of maintaining an acceptable level of perceived risk Dr. Mitch Kabay, wrote that “security is a process, not an end state.” So what is the process… What is Security? The Security Process Assessment is preparation for the other three components deals with policies, procedures, laws, regulations, budgeting, and other managerial duties, plus technical evaluation of one’s security posture Failure to account for any of these elements harms all of the operations that follow Why is this? Assessment Protection is the application of countermeasures to reduce the likelihood of compromise What are some of these countermeasures and why do we use them? Protection Detection is the process of identifying intrusions Intrusions are policy violations or computer security incidents Kevin Mandia and Chris Prosise define an incident

Download Document

Here is the link to download the presentation.
"CSIS 3756 Security Design Mr. Mark Welton Course"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

CAD for VLSI DESIGN I CAD for VLSI DESIGN I CAD for VLSI DESIGN I Course Objectives  The Central Scheme of Interest Subsidy for Education Loans SENIOR LEADER BIOGRAPHY Pacific forum csis SUU CSIS 1000 Overrides THE GOSPEL OF MARK Mark Associate of Peter Mark 14.12-25  |  Mark 14.26-42 Mark 1-16 Mark 	A Jew writing to the Gentiles! The Adventures of Huckleberry Finn By Mark Twain Meet Mark Twain Mark-Sweep and Mark-Compact GC Riverfront Mark Weinstein (BOOK)-Cryptography and Network Security: Demystifying the ideas of Network Security,