03-14-2013, 08:10 AM
Ace description for Computer Security for Everyone
TESC description for Computer Security & Info Theory
The last one is a bit of a stretch, but the other ones are pretty close. I think that there is a good chance the CIS course will count as a natural science, but I'm not so sure about CMP and CAP. At least it would be better if we could get some UL computer credits out of these instead of unspecified, LL credits in law and management.
Quote:Upon completion of this course, the student will be able to explain the legal issues behind Internet regulations, online contracting, consumer protection, employee privacy, online marketing, as well as the roles and involvement of such organizations as the Federal Trade Commission and the International Chamber of Commerce; identify laws that combat intellectual property cybercrimes such as copyright infringement, unauthorized access of data or systems, and cyber fraud; identify issues involving trademarks, domain names, and websites, including the domain name registration process, hyperlinking and copyright infringement, cybersquatting, trademark infringement, the role of The Internet Corporation for Assigned Names and Numbers (ICANN), and laws such as the Anti-Cybersquatting Consumer Protection Act and the Federal Trademark Dilution Act; describe Internet fraud issues such as identity theft, the prevention and avoidance of identity theft, and the Identity Theft and Assumption Deterrence Act; discuss electronic evidence and discovery, including the validity and discovery of electronic evidence in cybercrimes, The USA Patriot Act, search and seizure restrictions and how they affect search engines and Internet service providers, the production of confidential business information, the Federal Rule of Civil Procedure amendments, the protection of confidential data and trade secrets, as well as computer security, incident response, and legal liability; discuss topics, such as the involvement of free speech and child pornography, online gambling in the United States, hate speech on the Internet, anti-hacking and anti-spyware laws, and legal liability for cyber security, including laws such as the Communications Decency Act, the Children's Online Privacy Protection Act, the United States Unlawful Internet Gambling; identify fundamental concepts, terms, ideas required for an informed discussion on ethical topics, and an overview of ethical business practices; identify what privacy is, who has it, who is entitled to it, and what threatens it; identify differing electronic means commonly used to gather data and threaten personal privacy; Identify defensive techniques and federal laws that defend privacy and discuss consent and how industry self-regulation impacts privacy; define what an intellectual object is, how intellectual objects differ from traditional (physical) objects, and how those objects may be owned; discuss U.S. copyright law, how copyrights are obtained, under what circumstances a copyright may be applied to computer software, patents, trade secrets, and trademarks, explaining the differences between those protections and copyrights, and other intellectual property issues; discuss why professional codes of conduct are important for cyber security professionals, commonly used and invoked professional codes, employer/employee relationships and the impact those relationships have on the practice of 'whistle-blowing', responsibility, accountability, and liability as they relate to professional codes of conduct; review issues surrounding speech on the Internet and the associated legal concerns, cyber-squatting, spam, censorship, varying forms of speech that some argue are protected and defamation on the Internet; discuss hacking and the two main categories of hackers, 'black hat' hackers and their motivations and characteristics, 'white hat' hackers and an examination of the key differences between white hat and black hat hackers, "hacktivism", cyber crime, cyber-terrorism, and how those acts are similar and dissimilar; identify anti-virus software, personal firewalls, Operating System (OS) variants, and securing the OS on a new computer; discuss the varying types of malicious software that can be encountered on the Internet as well as general strategies for identifying and neutralizing these programs; discuss peer-to-peer (P2P) file sharing and the risks (technological and legal) that can come with the use of P2P software; identify encryption, and how to use encryption to successfully protect your data, even when your computer is stolen, as well as various strategies that can be used to ensure the physical security of your computer; identify the basics of networking, securely setting up and running small computer networks, firewalls, wired and wireless network configuration, wireless encryption standards, generating strong passwords/network keys, and typical attacks that might be launched against your network; summarize the use of encryption to secure data being transmitted over a computer network, as well as information security best practices and guidelines; discuss techniques for purging cookies and browser cache, as well as social engineering attacks and how to identify and defeat them; and identify safe browsing and the consequences that can result from failing to use safe browsing habits.
TESC description for Computer Security & Info Theory
Quote:Computer Security & Info Theory (CMP-401) 3.00 s.h.
Information and coding, measurement and transmission of information, redundancy, noise, data bank security in government and industry, computer network weaknesses, data encryption.
The last one is a bit of a stretch, but the other ones are pretty close. I think that there is a good chance the CIS course will count as a natural science, but I'm not so sure about CMP and CAP. At least it would be better if we could get some UL computer credits out of these instead of unspecified, LL credits in law and management.
Graduate of Not VUL or ENEB
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc


![[-]](https://www.degreeforum.net/mybb/images/collapse.png)