Notice: wpcf7_remove_shortcode is deprecated since Contact Form 7 version 4.6! Use wpcf7_remove_form_tag instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-content/plugins/contact-form-7/includes/functions.php on line 374

Notice: wpcf7_remove_shortcode is deprecated since Contact Form 7 version 4.6! Use wpcf7_remove_form_tag instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-content/plugins/contact-form-7/includes/functions.php on line 374

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777
CIS Curriculum Healthcare Cybersecurity Concentration - Parker University - Parker University

CIS Curriculum Healthcare Cybersecurity Concentration

Healthcare Cybersecurity Concentration:

18 Total credit hours

credit hours

Introduction to the concepts of computer technology related to health care and the tools and techniques for collecting, storing, and retrieving health care data. (3 credit Hours).

3

This course is an introductory course in collecting, examining, and preserving evidence of computer crimes. This course examines the issues, tools, and control techniques needed to successfully investigate illegal activities facilitated through the use of information technology. The tools of collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods, and loss resulting from e-crimes will be examined.

Prerequisites: BCIS 1301 Fundamentals of Computer Information Systems

3

This course will cover Network Security Policies, HIPPA Privacy Rule, and implementation of firewall policies, stateful firewalls, and firewall appliances. Network-related physical security, risk management and disaster recovery/contingency planning issues and housekeeping procedures.

3

This course provides an in-depth look at intrusion detection methodologies and tools and the approaches to handling intrusions when they occur; examines the laws that address cybercrime and intellectual property issues; and includes a study of proper computer and network forensics procedures to aid in the identification and tracking of intruders and in the potential prosecution of criminal activity.

Prerequisites: COSC 3305 Web Application Security 1

3

The security issues related to web applications will be discussed in this course. Topics include web application authentication, authorization, as well as browser and web database security principles. Various web application security attack types such as code injection, cross-site scripting, and cross-site request forgery will be studied. The course will also include discussions about business aspects that contribute to a secure web-based transaction environment.

Prerequisites: BCIS 2322 Client-Side Scripting (JAVASCRIPT & HTML)

3

This course provides a foundation in networking technologies that are core to creating secure networks. Topics included in this course are basic cryptography, secure networking protocols, logical and physical security management and security devices. Relation between these technologies and operational and implementation issues for these technologies will also be discussed.

Prerequisites: BCIS 2306 Fundamentals of Network Systems, BCIS 3303 Networking II

3