Career Advice for Job Seekers

The Coolest Course Requirements of an IT Security Degree

William Frierson AvatarWilliam Frierson
July 26, 2012


IT Security DegreeEvery company and organization has a need for IT security:  unless they are somehow still in the Jurassic Age and not using computerized systems. This field deals with securing networks and protecting data from intrusive attacks. Those who pursue an Information Security Master’s Degree will be prepared to head a security team of technologists who create systems to ensure the security of all things IT-related. This field goes beyond a standard Information Technology degree and specifically focuses on security. The course load for this degree has some unique and interesting classes.

Learn How to Hack…Ethically

An IT Security Degree is often playfully referred to as a “Hacking Degree.” This is due to the fact that in order to learn how to protect an IT system, you must also learn how to hack it, coincidentally. Students are instructed how to hack a system; they are trained how to detect intrusions and how to handle them. Every IT security program will also include an ethics course, so that this knowledge is not used for nefarious purposes.

The Cool Courses

1.Hacker Techniques, Exploits and Incident HandlingThis exciting course provides information about finding vulnerabilities, detecting intrusions and incident handling. The information contained in this course turns the tables on hackers. Every type of attack is addressed, from more technologically advanced attacks to classic “low-tech” approaches. Students will receive a time-tested process for responding to computer incidents. There are hands-on workshops that illustrate how to search for exploits and how to defend IT systems. Legal issues involved with incident handling will also be addressed.

2.Defending Web Applications Security EssentialsWeb applications are a relatively new addition to most company’s IT portfolio. They are increasing in popularity and are becoming targets for attack. This course will address how network defenses fails to prevent attacks on web applications, and teaches students how to secure these applications. Coursework includes training in: server configuration, authentication mechanisms, logic flaws, web services and flaws, cross-site request forging, application coding errors and protective HTTP headers. Students will leave this course with a clear strategy to help them secure their organization’s web applications.

3.Web App Penetration Testing and Ethical Hacking This interesting course examines a methodical testing strategy that finds vulnerabilities and goes beyond simple SQL injections. It directly puts the student in the seat of the attacker and trains students to view web applications as a hacker, instead of a defender. This course provides in-depth experience, as students attempt to hack various web applications. The ethics of hacking are also addressed in this course. Students will walk away with a detailed understanding of how attackers use exploits to extract data.

4. Computer Forensics InvestigationsThis course covers forensic analyst techniques used to investigate computer incidents, successfully resolve them and restore any lost data. This course will equip a security specialist with evidence acquisition tools and techniques, an understanding of registry forensics and thorough knowledge of Windows file system basics. It will also cover media analysis, such as email, chat and IM and explore how they are used to compromise systems.

5. In-Depth Intrusion DetectionThis course teaches practical intrusion detection and traffic analysis. Students will learn how to methodically understand TCP/IP packets and will use a variety of programs to detect these attacks. This course covers advanced TCP/IP concepts, fragmentation, Microsoft protocols, DNS attacks and how to analyze network traffic. Students will leave this course understanding how to analyze and respond to network intrusion.

Enjoy the Fun Side of IT

IT degrees can expand beyond setting up networks and computer systems. With an IT security degree, students will explore the interesting and fun side of IT:  hacking and security. The above courses are a sampling of the cool topics that are covered in the requirements for becoming an IT security expert. Students will learn how to hack networks, web applications and computer systems themselves. Students will become specialists at proactively preventing these attacks and learn how to restore any lost data.

If you are considering taking your IT knowledge to the next level, IT security is certainly an exciting path to follow!

This article was provided by Angelica Kingery who is currently enrolled in an Information Security Masters Degree program.  She expects to have her degree later this year and can’t wait to get out of the classroom and into a career.

(Image provided by Wonderlane from Flickr’s Creative Commons)

New Job Postings

Advanced Search

Related Articles

No Related Posts.
View More Articles