Metropolitan State University


 My Plan for Fall 2017
 Wish List:  

Login to view your plan.

 Wait List:  

View/Modify Schedule  Registered:  Expand My Plan  
Remove from Wait List

< New Search Continue to Review My Plan >

ICS 460 - Networks and Security
Fall 2017, Section 02

ID #Subj#SecTitleDatesDaysTimeCrdsStatusInstructorDelivery MethodLoc
000830 ICS 460 02 Networks and Security
08/22 - 11/28
T
6:00pm - 9:20pm
4.0 Open Chetty, Damodar Kumar
Location: Normandale Community College
Building/Room: Normandale CC P1804


Meeting Details
DatesDaysTimeBuilding/RoomInstructor
8/22/2017 - 11/28/2017 T 6:00pm - 9:20pm Normandale CC P1804 Chetty, Damodar Kumar

Notes
  • Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.

Location Details
Offered through: Metropolitan State University.
Campus: Metropolitan State University. Location: Normandale Community College.

Seat Availability
Status: Open Size: 30 Enrolled: 27 Seats Remaining: 3

Prerequisites (Courses and Tests)
[MATH 215 - Discrete Mathematics AND ICS 240 - Introduction to Data Structures]
Restrictions
  • Requires minimum credits: 30
  • Restricted to the following major(s): Computer Science, Computer Information Technology, Computer Forensics, Computer Application Development

Add/Drop/Withdraw
Full refund is available until August 27, 2017, 11:59PM CST.
Adding course is closed. Dropping course is closed.
The last day to withdraw from this course is November 20, 2017.

Tuition and Fees (Approximate)

Tuition and Fees (approximate):

Tuition -resident: $910.12
Tuition -nonresident: $1,856.92
Approximate Course Fees: $137.88

Course Level
Undergraduate

Description
Principles and practices of the OSI and TCP/IP models of computer networks, with special emphasis on the security of these networks. Coverage of general issues of computer and data security. Introduction to the various layers of network protocols, including physical, data link, network, and transport layers, flow control, error checking, and congestion control. Computer system strengths and vulnerabilities, and protection techniques: Topics include applied cryptography, security threats, security management, operating systems, network firewall and security measures. Focus on secure programming techniques. Programming projects.

Add To Wait List