|  | Oct 30, 2025 |  |  | 
	     
			
		  	|  | 
              
                | CFI 1083 - System Security and Network Auditing Credits: 3Hours/Week: Lecture 2 Lab 2
 Internship hours per week 0
 Course Description: This course introduces the best practices in hands-on troubleshooting, assessing an enterprise environment’s security posture, and implementing appropriate security solutions. Course activities provide opportunities to explore how to monitor and secure hybrid environments, including cloud, mobile, and IoT.  Course topics address applicable laws and policies, principles of governance, risk, and compliance, and how an analyst can identify, analyze, and respond to security events and incidents.
 MnTC Goals
 None
 
 Prerequisite(s): None
 Corequisite(s): None
 Recommendation: CFI 1085  is recommended before taking this course for students in the CFI program
 
 Major Content
 
 
	Social engineering and malwareData Security and vulnerabilities assessmentWireless and network securityNetwork security devices and technologyCryptography and public key infrastructure.Account management and authenticationAccess managementEmbedded devices and mobile securityImportance of ethical issues and civic responsibility in cyber securityCommon ethical dilemmas and decision-making for cybersecurity professionalsCybersecurity professionals’ obligations to the publicEthical frameworks guide and best practices in cybersecurity practice Learning Outcomes
 At the end of this course, students will be able to:
 
	implement computer security policies in a network environment.explain user rights and the need for documented permission.evaluate the information contained in network and Windows log files.implement security policies from templates and other security tools from Windows.configure Windows software management applications such as SUS, SMS, and Windows Update to ensure security compliance across the network.explain the basic windows infrastructure.interpret firewall and IIS log files.use Windows scripting, auditing, and scheduling tools.Explain how technology can impact user behaviors, privacy, politics, and relationship.Discuss the role of Cybersecurity concerning ethics, artificial intelligence, and  (such as online bullying, data collection, micro-targeting, and profiling).Describe common ethical challenges and social dilemmas for Cybersecurity in the technology industry. Minnesota Transfer Curriculum (MnTC): Goals and Competencies
 Competency Goals (MnTC Goals 1-6)
 None
 Theme Goals (MnTC Goals 7-10)
 None
 
 
 Courses and Registration
 
 
 Add to Portfolio (opens a new window)
 |  |