The Technology Age is a two-pronged sword, which comes with a plethora of opportunities and challenges. On one hand, it has completely revolutionized how citizens and consumers conduct their daily affairs. From ordering groceries, to filing taxes online, the web has opened an array of portals that people could only have dreamed of decades ago.
Unfortunately, this increasingly digitized world has... also opened up a portal to a counter-culture: Black hat hackers, spammers, phishes and other types of skilled computer terrorists. With such breaches occurring daily, an entire new career field has opened up to dedicate its brainpower to circumvent the ill-meaning attempts that outside intruders exert on our sensitive information. This is especially true for businesses whose livelihood depends on the data they store in computer-based systems.
That is where computer security specialists come in. These professionals design, implement, and maintain information security for organizations in all kinds of industries. Their role is not strictly technical: While they usually install and maintain security software and systems, they also play an educator's role on teaching people how to optimally secure their home computers. Also, they play an investigators' role, sometimes being called upon to gather forensic evidence against cyber crime.
Enrolling in an online associate, bachelor, or master program in computer security or network security can either be a stepping stone or an advanced edge in showing that you have knowledge. Many of these courses cover forensic investigations, federal and state privacy laws, intellectual property (IP), the rules of search and seizure, cyber-crime laws as well as the troubling rise of cyber-terrorism. These programs typically blend mathematics, networking and programming courses, with an emphasis on hands-on training for real-life cyber attack scenarios.
At the advanced level, you may wish to earn a doctorate online in business administration, with a concentration in computer and IS. This program is designed to meet the demand for computer security professionals knowledgeable in cyber-terrorism, computer forensics and computer security. Students may learn valuable tools and techniques such as data preservation, data identification, data extraction and forensic analysis of systems (using industry-standard toolkits).
While most of these professionals work in IT services for private industry, some also work as government contractors and in aerospace and defense. Thus, most courses explain computer security programs as well as how to manage them from a law enforcement, private security, management and government perspective.
To introduce Part II of the SecureWay portfolio for e-commerce and IBM security services for e-business.
To provide an overview of IBM^s security products and services, which are available for system, network, and e-business applications.
Course In Development.
Course In Development.
To provide an overview of IBM^s OS/390 security products and services for system, network, and e-business applications.
To give students the ability to configure, monitor, and manage AS/400 security.
To provide an understanding of the technologies behind and the operation of a Public Key Infrastructure (PKI).
To provide the student with a knowledge of secure communications.
To demonstrate how to plan and implement a firewall based on a security policy.
To provide an overview of the threats to an organization using Internet technologies and to outline policies, procedures and technologies designed to counter these threats..
To provide an overview of secure e-commerce, including consumer to business and business to business e-commerce.
To provide an overview of the various cryptographic techniques used for internetworking applications.
To provide an overview of the threats to an organisation^s Internet servers and services, and to explain concepts, technologies and practices to minimize or counter these threats.
To introduce users to the issues associated with hosting or administering a web site.
To explain viruses and hostile applets, and how to minimize their threat in networked systems.