Healthcare Cybersecurity Concentration
Introduction to the concepts of computer technology related to health care and the tools and techniques for collecting, storing, and retrieving health care data. (3 credit Hours).
This course is an introductory course in collecting, examining, and preserving evidence of computer crimes. This course examines the issues, tools, and control techniques needed to successfully investigate illegal activities facilitated through the use of information technology. The tools of collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods, and loss resulting from e-crimes will be examined.
This course will cover Network Security Policies, HIPPA Privacy Rule, and implementation of firewall policies, stateful firewalls, and firewall appliances. Network-related physical security, risk management and disaster recovery/contingency planning issues and housekeeping procedures.
This course provides an in-depth look at intrusion detection methodologies and tools and the approaches to handling intrusions when they occur; examines the laws that address cybercrime and intellectual property issues; and includes a study of proper computer and network forensics procedures to aid in the identification and tracking of intruders and in the potential prosecution of criminal activity.
The security issues related to web applications will be discussed in this course. Topics include web application authentication, authorization, as well as browser and web database security principles. Various web application security attack types such as code injection, cross-site scripting, and cross-site request forgery will be studied. The course will also include discussions about business aspects that contribute to a secure web-based transaction environment.
This course provides a foundation in networking technologies that are core to creating secure networks. Topics included in this course are basic cryptography, secure networking protocols, logical and physical security management and security devices. Relation between these technologies and operational and implementation issues for these technologies will also be discussed.