Online computer security courses generally
fall into two basic areas of study. The first, and by far the most
common, is computer (and network) security in business, industrial,
military and civil government settings. Many schools, colleges and
independent businesses offer courses and degrees in this area. The
second basic area is computer security for private individual use.
Courses in this second area typically do not lead to degrees, but
provide personal enrichment and education.
Computer security courses designed for business and public service
are often part of degrees like an Associate in Information Technology,
Bachelor of Science in Information Management and Security or Bachelor
of Science in Homeland Security. Possible advanced degrees include a
Master of Science in
Information Systems
Technologies. Schools and independent businesses may also award
certificates such as a Computer Security Certificate or a Software
Security Foundations Certificate.
General Requirements for Online Courses
The often intensive nature of some online classes requires students
to have computers with up-to-date processing speeds, audio-video
programs, security applications and firewalls. High-quality printers may
be needed as well. Students may work individually or in class groups
examining case studies, so high-speed online access, instant messaging
programs and internet phone service may be required.
Many of these courses have prerequisites and recommend specific
background knowledge, such as computer programming. These requirements
are usually listed in the class descriptions. Most classes are
completely online, but a few may require on-campus visits for final
examinations.
Sample List of Online Computer Security Courses
Basics of Industrial Computer Security Course
Students learn the fundamentals of operating systems, software and
network security in this course. Also presented are industry standards,
compliance testing, business applications and Internet security. The
course addresses encryption basics and introduces security needs
analysis.
Using Cryptography in Effective Security Protocols Course
In this course students develop techniques to identify and avoid
cryptographic programming errors that can leave systems vulnerable. The
course also analyzes implementing existing security protocols and
examines their potential flaws. Students research known issues and
possible threats.
Computer Security and Homeland Security Course
This course details the need for business contingency and continuity
plans in the context of homeland security. Students model methods to
prevent cyber-attacks and minimize information loss. Specific emergency
response techniques to maintain computer security and restore network
integrity during and after a national crisis are also presented.
Implementing Data Security on the Web Course
Students develop business security policies and craft standard
operating procedures in this course. Also examined are techniques for
maintaining data security on new and extant networks. Other topics
include human and technological issues, identifying risks, situation
management and company-wide security education.
Basic Personal Computer Security Course
This course provides private individuals with specific tips to
maintain security on personal computers. Students learn techniques to
protect online identity, avoid phishing and safeguard against viruses,
adware, worms and other forms of malware. Although designed for adult
learners, this class offers specific advice for parents to provide safe
computer experiences for children.
No comments:
Post a Comment