|
Jan 15, 2025
|
|
|
|
CIS 414 - API Security5 Credits Students build on skills learned in earlier database security courses by extending their practice into cloud environments. Students work through cloud labs and design reproducible builds that deploy to hosted infrastructure. Attention will be paid to the identity and access management and to the system, network, and data security features of this type of environment. Students identify the security risks of Application Programming Interfaces (APIs), exploit the vulnerabilities and mitigate the API risks.
Pre-requisite(s) CIS 412 min. 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesAcademic Technology Fee
Quarters Typically Offered Designed to Serve For students admitted to the BAS program in Cybersecurity and Digital Forensics. Active Date 20240401T16:34:47
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Review database security principles
- Distributed database security
- Identity access management
- Host security
- Network security
- Automated deployment of installation and deployment of database infrastructure
- Cloud environments
- Use relevant programming and scripting languages to automate database deployment, configuration changes, and tests
- Testing, hardening, and defending database infrastructure
- Encryption
- At rest
- In transit
- Document database security issues
- API security
- Identity security risks of API
- Exploit the vulnerabilities
- Mitigate the risks
Student Learning Outcomes Design improvements and redeploy infrastructure through architectural review and security audits
Create database infrastructure through automation
Install database infrastructure in a variety of environments including cloud environments
Design and apply technical configurations to accommodate the laws and policies relevant to data protection
Apply identity and access management schemas for database infrastructure
Implement encryption techniques for data at rest and in transit
Identify the security risks of APIs, exploit the vulnerabilities and mitigate the API risks
Add to Portfolio (opens a new window)
|
|