3 Semester Credit Hours
Securing access to an organization’s assets and infrastructure is a vital part of security policy development and implementation. This course offers a thorough understanding of methods and equipment used to maintain access control from a network security perspective. Emphasis is given to the identification and implementation of effective security controls to protect organizations information assets from natural, environmental, and human threats. Risk Assessment methodology is used to evaluate the selection and implementation of perimeter protection. Perimeter access control and monitoring techniques used to protect organizations from internal and external threat agents are examined. Labs consist of assigned practice, projects and/or case studies relating to topics covered. Course contains 2 semester credit hours (30 clock hours) of lecture and 1 semester credit hour (30 clock hours) of laboratory work.