Saturday, February 10, 2007

Faculty Development Lecture Series

It's all set! Here is a list of the scheduled lectures:

***********************************************************

Lecture 1: Integrating Information Security into the CS/IT Curriculum

Intended Audience: General

Synopsis: The presentation is an overview of the integration of Information Security into a CS/IT curriculum. The need for such effort will be established and a proposed project to vertically integrate information security into a CS/IT curriculum will be discussed. Jacksonville Sate University’s security capstone courses, their implementations, resources, and projects will also be covered.


Lecture 2: Introduction to Information Security

Intended Audience: General

Synopsis: The presentation is a high level treatment of information security. It covers the three basic security issues: confidentiality, integrity, and availability. Also included are topics on protocols, policies, different types of attacks, and the available technologies to thwart those attacks.


Lecture 3: Layered Perspective of Network Security: Physical to Network Layers

Intended Audience: Hardware and Network Personnel

Synopsis: This is the first of the three part series on attacking and defending the network protocol stack. It covers different methods of attack and the tools used to carry out those attacks on the three lowest layers of the OSI protocol stack. The presentation also covers protection and detection schemes that can be implemented to prevent or minimize the damage associated with such attacks.


Lecture 4: Java Visualization

Intended Audience: Software Developers

Synopsis: This lecture will cover the Java 2D visualization API found in JFreeChart. The audience will be given a hands-on tutorial on Netbeans GUI programming and on creating visual charts for various data collected from security logs and system performance logs.

Lecture 5: Layered Perspective of Network Security: Transport to Presentation Layers

Intended Audience: Hardware and Network Personnel

Synopsis: This is the second of the three part series on attacking and defending the network protocol stack. This lecture covers the methods of attacking and defending the middle OSI protocol stacks: transport, session, and presentation layers. Attack and defense tools will also be described.


Lecture 6: Java and .Net Framework Cryptography

Intended Audience: Software Developers

Synopsis: This lecture presents basic encryption and hash digest techniques. Applied cryptography will be demonstrated using actual implementations that utilize cryptographic APIs in Java and C# frameworks.


Lecture 7: Layered Perspective of Network Security: Application and People Layers

Intended Audience: Hardware and Network Personnel

Synopsis: This is the last of the three part series on attacking and defending the network protocol stack. It covers the attacks and the defenses on the topmost layer OSI layer. The most critical and vulnerable component of IT, the user, will also be closely examined.


Lecture 8: Digital Forensics

Intended Audience: General

Synopsis: This lecture presents the identification, acquisition, preservation, and analysis of digital information. It also examines the various tools used in digital forensics and the formal digital forensic reporting guidelines.


Lecture 9: Access Control

Intended Audience: General

Synopsis: This presentation examines the two major components of access control: authorization and authentication. Also covers various security models and Intrusion Detection Systems (IDS).

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home