Jan 15, 2025  
2024-25 Catalog 
    
2024-25 Catalog
Add to Portfolio (opens a new window)

CIS 414 - API Security

5 Credits
Students build on skills learned in earlier database security courses by extending their practice into cloud environments. Students work through cloud labs and design reproducible builds that deploy to hosted infrastructure. Attention will be paid to the identity and access management and to the system, network, and data security features of this type of environment. Students identify the security risks of Application Programming Interfaces (APIs), exploit the vulnerabilities and mitigate the API risks.

Pre-requisite(s) CIS 412 min. 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesAcademic Technology Fee

Quarters Typically Offered
Designed to Serve For students admitted to the BAS program in Cybersecurity and Digital Forensics.
Active Date 20240401T16:34:47

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
 

  1. Review database security principles
  2. Distributed database security
    1. Identity access management
    2. Host security
    3. Network security
  3. Automated deployment of installation and deployment of database infrastructure
  4. Cloud environments
  5. Use relevant programming and scripting languages to automate database deployment, configuration changes, and tests
  6. Testing, hardening, and defending database infrastructure
  7. Encryption
    1. At rest
    2. In transit
    3. Document database security issues
  8. API security
    1. Identity security risks of API
    2. Exploit the vulnerabilities 
    3. Mitigate the risks


Student Learning Outcomes
Design improvements and redeploy infrastructure through architectural review and security audits

Create database infrastructure through automation

Install database infrastructure in a variety of environments including cloud environments

Design and apply technical configurations to accommodate the laws and policies relevant to data protection

Apply identity and access management schemas for database infrastructure

Implement encryption techniques for data at rest and in transit

Identify the security risks of APIs, exploit the vulnerabilities and mitigate the API risks



Add to Portfolio (opens a new window)