{"id":1256,"date":"2022-12-19T04:48:13","date_gmt":"2022-12-19T04:48:13","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=1256"},"modified":"2022-12-19T04:50:22","modified_gmt":"2022-12-19T04:50:22","slug":"cources","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/12\/19\/cources\/","title":{"rendered":"Courses"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\"><span style=\"color: #000000\"><span style=\"font-size: large\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/12\/ECE-567-Outline-Spring-2022.pdf\" style=\"color: #000000\"><strong>ECE 567 \u2013 Advanced Network Security<\/strong><\/a><\/span>\u00a0<\/span> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Presents, from a practical perspective, underlying principles and techniques of network security. Students are exposed to ethical hacking and penetration testing. Various protection methods, used in practice to detect and respond to malicious network attacks, are presented. Students also learn how to implement successful security policies and defense mechanisms and strategies, with a particular focus on firewalls, intrusion detection and response, virtual private networks and biometrics technologies.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/12\/ECE-567-Outline-Spring-2022.pdf\"><strong><span style=\"font-size: medium\">Course outline<\/span><\/strong><\/a><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/12\/ECE-570-Outline-2022.pdf\"><strong><span style=\"font-size: large\"><span style=\"color: #000000\">ECE 570 \u2013 Digital Forensics Methodologies<\/span>\u00a0<\/span> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/strong><\/a>Digital forensics notions and techniques used in the investigation of cybercrimes. Legal awareness of computer security and forensics, evidentiary process techniques, computer forensics methodologies with an emphasis on computer incident response and Information Technology (IT) systems\u2019 protection. Ethics, rules of evidence, effective communications, search and seizure relative to privacy legislation. Threats, how they can be detected, and controls to reduce the likelihood of their occurrence.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/12\/ECE-570-Outline-2022.pdf\"><strong>Course outline<\/strong><\/a><\/span><span style=\"font-size: medium\"><\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-size: medium\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/12\/SENG-426-Outline-2022.pdf\"><strong><span style=\"font-size: large;color: #000000\">SENG 426 \u2013 Software Quality Engineering\u00a0<\/span> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/strong><\/a>An integral facet of software development, from requirements through delivery and maintenance. The principles of modern software engineering practices, such as DevOps and Site Reliability Engineering (SRE), with an emphasis on automation, continuous delivery and deployment. Topics include planning and achieving quality assurance goals such as reliability, security, performance and scalability for complex software systems.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/12\/SENG-426-Outline-2022.pdf\"><strong>Course outline<\/strong><\/a><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ECE 567 \u2013 Advanced Network Security\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Presents, from a practical perspective, underlying principles and techniques of network security. Students are exposed to ethical hacking and penetration testing. Various protection methods, [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1256","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/1256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=1256"}],"version-history":[{"count":5,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/1256\/revisions"}],"predecessor-version":[{"id":1265,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/1256\/revisions\/1265"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=1256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=1256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=1256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}