Metropolitan State University


 My Plan for Fall 2017
 Wish List:  

Login to view your plan.

 Wait List:  

View/Modify Schedule  Registered:  Expand My Plan  
Remove from Wait List

< New Search Continue to Review My Plan >

ICS 382 - Computer Security
Fall 2017, Section 50

ID #Subj#SecTitleDatesDaysTimeCrdsStatusInstructorDelivery MethodLoc
000825 ICS 382 50 Computer Security
08/19 - 12/10
n/a
na - na
4.0 Open Luoma, Milton
Mostly Online Location: z MnSCU Metropolitan State University


Meeting Details
DatesDaysTimeBuilding/RoomInstructor
8/19/2017 - 12/10/2017 n/a na - na n/a Luoma, Milton

Notes
  • Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites. Note: This is a predominantly online course, not an independent study. Course has required proctored exams. Intermediate computer/Internet skills required. For online learning and course access information go to www.metrostate.edu/col click on Student Resources.

Location Details
Offered through: Metropolitan State University.
Campus: Metropolitan State University. Location: z MnSCU Metropolitan State University.

Seat Availability
Status: Open Size: 30 Enrolled: 28 Seats Remaining: 2

Prerequisites (Courses and Tests)
[MATH 215 - Discrete Mathematics AND ICS 141 - Programming with Objects; OR , CFS 280 - Introduction to Computer Forensics]
Restrictions
  • Requires minimum credits: 30

Add/Drop/Withdraw
Full refund is available until August 27, 2017, 11:59PM CST.
Adding course is closed. Dropping course is closed.
The last day to withdraw from this course is November 20, 2017.

Tuition and Fees (Approximate)

Tuition and Fees (approximate):

Tuition -resident: $1,214.92
Tuition -nonresident: $1,214.92
Approximate Course Fees: $137.88

Course Level
Undergraduate

Description
This course introduces principles of computer security with integrated hands-on labs. The course prepares students to effectively protect information assets by providing fundamental details about security threats, vulnerabilities, and their countermeasures ranging from a simple computer to enterprise computing. Topics include broad range of today┬┐s security challenges, common security threats and countermeasures, security management, access control mechanisms, applied cryptography, privacy issues, computer ethics, file system security, and network security.

Add To Wait List