Free Information Security Courses - University of Michigan

Discussion in 'IT and Computer-Related Degrees' started by jhp, Mar 5, 2014.

Loading...
  1. jhp

    jhp Member

    Messages:
    619
    Likes Received:
    0
    I received this offer through a professional listserv I belong to:

    The four course are:

    ITS 258: Network Security
    ITS 260: Mobile Device Security
    ITS 270: Intrusion Detection
    ITS 372: Advanced Web Security

    To get started, you will need to establish a "Friend Account."

    ITSDocs: Set Up a Friend Account for Guest Access to U-M Computing Resources (S4316)

    Once your account is setup, access the following page to see the courses:

    https://www.safecomputing.umich.edu/training/ITSEduc.html

    Course Descriptions:

    ITS 258: Network Security
    This course provides intermediate training in securing networked enterprise deployments, and covers network topologies, firewalls, and open-source and commercial network scanners.

    ITS 260: Mobile Device Security
    This course provides basic training in the secure use of mobile devices. Best practices and self-management in the secure use of these devices is covered, and includes: definition of private data, threats to data on mobile devices, and securing these data. Built-in and freely available technologies are discussed, including BitLocker and EFS for Windows systems, encrypted volumes and FileVault for Mac OS X, and use of Lexar SecureII jump drives for encrypted storage of data. A demonstration of the use of the Lexar Secure II jump drive is included.

    ITS 270: Intrusion Detection
    This course provides an overview of Intrusion Detection and Prevention systems, and discusses the architecture, implementation, and efficacy of such systems. Students will use the open source Snort IDS systems to create scripts for detecting network attacks, and will experiment with sampling of real or recorded network traffic.

    ITS 372: Advanced Web Security
    This course shows how to assess and secure your web infrastructure, using current open-source tools and techniques. Topics to be covered include: reconnaissance tools, code and SQL injection, cross-site scripting and request forgery, secure coding practices, fuzzing, and U-M information security policies. This course includes hands-on student experiments using a virtual lab environment.
     
  2. paggy

    paggy New Member

    Messages:
    14
    Likes Received:
    0
    Very useful post
     
  3. Pelican

    Pelican Member

    Messages:
    226
    Likes Received:
    0
    Can students earn credit? Will these go on a transcript?
     

Share This Page