Information Assurance Basics
Designed as a practical, hands-on lab course,
participants will go through a series of exercises.
Center for Academic Excellence in
Information Assurance at
|
MONDAY |
TUESDAY |
WEDNESDAY |
THURSDAY |
FRIDAY |
|
Introduction |
Securing Microsoft Windows
Computers and Networks |
Securing
Linux/Unix Computers and Networks |
Network Security |
Network Vulnerability
Assessment Methodology |
|
Vulnerabilities
(Hazards) |
Troubleshooting Linux |
|
Module
Presentations and Review of Workshop |
|
|
Security
Policy-Large Group Hart Rossman, SAIC |
Wireless
Networks-Large group |
Physical
Security |
Forensics
Techniques Cyberforensics Workshop |
|
|
Implementing
a Security Policy (Examples) |
Exploiting Linux/Unix
Computers and Networks |
Developing
Modules |
Developing
Modules |
|
|
Q & A |
Q & A |
Q & A |
Q & A |
|
Each participant will be expected to develop and distribute a module, hands-on lab or unit to teach some aspect of a security course or workshop.
Click here to return to Wayne's World's home page:
Wayne Summers summers_wayne@ColumbusState.edu