Course Syllabus
Topics for the defense of enterprise network architecture and securing cloud computing technologies. Theory and steps for setting up the security, networking, threat prevention, logging, reporting and traffic handling features of Next-Generation Firewalls (NGFs), with additional emphasis on cloud container configurations for managing risks of cloud and data center deployment, management of the Cloud Secure Development Life Cycle (CSDLC), and other Cloud Security Operations (CloudSecOps).
-
Analyze and evaluate enterprise network architectures to identify vulnerabilities and design robust defense mechanisms.
-
Learn the principles and techniques for securing cloud computing environments, including cloud-specific risks and mitigation strategies.
-
Gain hands-on experience in setting up security, networking, threat prevention, logging, reporting, and traffic handling features of NGFs. Note: I have covered firewall and configuration at host and network level in Cyb 202. I also covered snort configuration under the topic of intrusion detection and prevention. you can spend 1-2 more weeks on this topic.
-
Learn cloud container configurations and understand their role in managing risks associated with cloud and data center deployments.
-
Understand and manage the Cloud Secure Development Life Cycle to ensure secure development and deployment processes.
-
Learn how to manage CloudSecOps to monitor, detect, and respond to cloud-based threats and incidents.
UPDATE WITH U of M BOILER PLATE
Please note that the specifics of this Course Syllabus are subject to change. Instructors will notify students of any changes and students will be responsible for abiding by them. Even if you print this syllabus, please check the online version often.
Description
Objectives
Upon successful completion of this course, students will:
- Describe the relationship between business strategy and IS strategy
- Be able to apply a life cycle development methodologies to an integration project
- Be able to manage an IS implementation project using an accepted integration methodology
- Understand the context of integration projects
- Be able to take a stakeholder’s view of a problem/opportunity and integrate it with other stakeholder views to determine the functional requirements of the current system
- Represent the functional requirements using unified modeling language (UML)
- Create a high-level system design based on a set of UML and other functional requirement documents.
Instructor
- Todd Price, PhD
Materials
- OPTIONAL: Grässle, P. Baumann, H. Baumann, P. (2005). UML 2.0 in Action: A Project Based Tutorial. Birmingham: PACKT Publishing, ISBN 9781904811558
- Other reading materials for this class are located within the course or linked to external sites.
Assignments & Grading
Grading Category | Percentage of Final Grade |
---|---|
Exams | 50% |
Individual Assignments | 22% |
Group Project | 25% |
Peer Evaluation | 3% |
TOTAL | 100% |
Course Grading Scale
The following are minimum cutoffs for each grade:
- 93.00% = A
- 90.00% = A-
- 87.00% = B+
- 83.00% = B
- 80.00% = B-
- 77.00% = C+
- 70.00% = C
- 60.00% = D
- less than 60.00% = F
Course Policies and Expectations
- Logging into Canvas - Students are expected to login regularly to check for course updates, announcements, emails, discussions, etc.
- Emailing through Canvas - Students are expected to use Canvas for all course email communication.
- Attending virtual meetings - Students are expected to use specified virtual meeting tool(s) for collaboration, meetings, presentations, etc., as needed.
Academic Integrity
While utilizing additional sources outside of this class is encouraged for gaining a better understanding of course concepts, seeking explicit answers for graded assignments from outside sources (e.g. Course Hero, Chegg, tutoring services like tutor.com, etc.) is considered CHEATING and will not be tolerated. Sanctions range from failure of the assignment or course to dismissal from the University. Additionally, sharing course content without permission is a violation of copyright and may result in university sanctions and/or legal ramifications. Contact your instructor with questions related to this topic.
Schedule
The following schedule outlines the topics covered in this course, along with the associated time frames, readings, activities, and assignments. All due dates reflect Eastern Time (ET). Specifying the time zone ensures that all students have the same deadlines, regardless of where they live.
Course Summary:
Date | Details | Due |
---|---|---|