NEWS FOR CURRENT
STUDENTS
This page is intended for current students or
those thinking about taking a class in the MSIS program. If you have any
questions, please contact Ray Klump by email
or by phone at 815-836-5528.
If you are not familiar with the Master of
Science in Information Security program at Lewis, you should visit the homepage
for the MSIS major to familiarize yourself with the program.
Quick Links:
Summer Semester Begins June 2, 2008
The following classes are offered the summer 8-week session.
To register for classes, please contact Ray Klump by
email or by phone at 815-836-5528.
68-515-9 |
Operating Systems and Distributed Systems
Required text: Operating Systems - A concept-based approach by D M Dhamdhere, ISBN 978-0-07-295769-3
|
T. Chow |
Tue 6-10 |
S120 |
68-525-9 |
Encryption and Authentication Systems
Recommended textbook: Cryptography and Network Security, 4th edition, by William Stallings
|
R. Klump |
Wed 6-10 |
S120 |
68-551-W |
Information Security Strategies and Risk Management
Required textbooks: Information Security Risk Analysis, 2nd Edition
Thomas Peltier
A Practical Guide to Security Assessments
Sudhanshu Kairab
Note: This course will be offered in blended format. Approximately half the sessions will be in-person in
Oak Brook, and half will be conducted online.
|
T. Moritz |
Thur 6-10
|
Oak Brook & online |
68-565-9 |
Secure Programming
Required textbook: 19 Deadly Sins of Software Security
Howard, LeBlanc, & Viega
|
W. Greene | Mon 6-10 | S121 |
68-595-9 |
Information Security Project
|
R. Klump |
Arranged
|
None |
Back to top
Fall Semester Begins August 25, 2008
The Fall Semester is divided into two terms. Term 1 meets from August 25 to October 17, and
Term 2 meets from October 20 to December 13.
During Term 1, the following courses are offered:
- 68-500-1 Computer Organization (Foundation, for those with an IT-related degree)
- 68-506-1 68-507-1, 68-508: Introduction to Information Security (Core)
- 68-530-1 Legal Issues in Information Security (Core)
- 68-555-X Security Assurance Principles (Management Elective)
- 68-557-X Project Management and Information Security (Management Elective)
- 68-564-1 Wireless Security (Technical Elective)
During Term 2, the following courses are offered:
- 68-515-1 Operating Systems and Distributed Systems (core)
- 68-561-1 Securing Linux (Technical Elective)
- 68-563-X Database Management and Security (Management & Technical Elective)
- 68-596-1 CISSP Prep #1 (Seminar Requirement)
- 68-597-1 CISSP Prep #2 (Seminar Requirement)
Also, the MSIS Capstone experience, 68-595-1, will be offered. It lasts the full 16 weeks of the semester.
Click here to download the full schedule, including instructors and room numbers.
To register for classes, please contact Ray Klump by
email or by phone at 815-836-5528.
Back to top
Tuition Reimbursement
If your company reimburses you for tuition costs, it is very important that
you complete a form and submit it, along with a letter from your employer
stating that you qualify for reimbursement, to the bursar at the very beginning of each semester.
You may download the form here. As part of what
you submit to the bursar, you must also provide a letter from your employee on company
letterhead that verifies your employment and that you are eligible for tuition
reimbursement. Please remember that this form and the accompanying letter must be filed at the beginning of
each semester!
Back to top
What do you need to graduate?
The graduation requirements are fairly easy to identify.
All students need 41 credit hours to graduate. The first 6 hours are the
foundation courses. Some students entered the program having received credit for
one or both of these courses, because they received credit for comparable classes elsewhere.
All students take the same set of core courses. All students also take a
practicum project for three credit hours and two seminar courses (often, but not
limited to, the CISSP preparation courses), each worth one hour of credit. Finally, students must take at
least four specialization classes from the technical and managerial tracks. A student may
take all four courses from one track, or he may take three courses from his track
of specialization and one course from the other track.
The following list summarizes the requirements. You may
use this as a checklist:
|
68-500 |
Computer Organization |
|
68-501 |
Principles of Programming |
|
68-505 |
Introduction to Information Security -or-
|
68-506 |
Introduction to Information
Security I |
|
68-507 |
Introduction to Information
Security II |
|
68-508 |
Introduction to Information
Security II |
|
|
68-510 |
Data Networks: Hardware, Protocols, and
Architecture |
|
68-515 |
Operating Systems and Distributed Systems |
|
68-520 |
Intrusion Detection, Response, and
Recovery |
|
68-525 |
Encryption and Authentication Systems |
|
68-530 |
Legal and Ethical Issues in Information
Security |
|
68-595 |
Information Security Project / Thesis |
|
First 1-hour seminar course |
For example, 68-596, 68-597, or 68-598. |
|
Second 1-hour seminar course |
For example, 68-596, 68-597, or 68-598. |
Four courses from the
following two groups, with at least three courses from your track of specialization. |
Managerial Track |
|
|
68-523 |
Computer Forensics |
|
68-550 |
Operational and Organizational Security |
|
68-551 |
Information Security Strategies and Risk
Management |
|
68-555 |
Security Assurance Principles |
|
68-557 |
Project Management and Information
Security |
|
68-563 |
Database Management and Security |
Technical Track |
|
|
68-523 |
Computer Forensics |
|
68-560 |
Securing Windows |
|
68-561 |
Securing Linux |
|
68-563 |
Database Management and Security |
|
68-564 |
Wireless Security |
|
68-565 |
Secure Programming |
Back to top
Practicum: Information Security Project
The purpose of the practicum course is to give you an
opportunity to apply what you have done in the rest of the curriculum. You
will identify a research topic or a project that solves a problem related to
information security. You will then research that topic or fulfill the
requirements of the project you identified and compose an original paper to
document your findings. Finally, you will present your work to interested Faculty
and fellow students. Here are some general guidelines:
- You must have received credit for at least three
courses in the major before enrolling in 68-595.
- You need not complete the project within the 8-week
session for which you enroll in it. In fact, in most cases, you should
expect to work on the project longer than 8 weeks. Credit will be deferred
until you submit your paper and it is approved. Thus, you may take
the capstone project when you know what it is that you want to do and it is
economically convenient for you to enroll in it.
- You must submit the title of your project and a one-page
description of its purpose and expected outcomes by the end of the second
week of the session for which you enroll in the class. The course director
will review your proposal, accept or reject it, and offer suggestions for
implementing it.
- The content of your thesis or project is up to
you. Your classroom experiences have exposed you to the many
challenges and issues in the information security field. Some of you also
have work or volunteer experiences that demand security expertise. Look
around for a topic that interests you, consult with the course director for
advice on the appropriateness of the topic, and then submit your formal
description for approval. The intent is to have you apply your lessons in a way that will be
meaningful to you.
- The deliverable for your project or thesis is a paper
at least thirty pages in length that includes references to the relevant
literature. The paper must be well-written: it must be free
of grammar, spelling, and punctuation errors. This is a document that
will become part of the major's archive for years, so the quality must be
something that represents the program well.
- The course director will serve as your advisor as you
work on the project. He or she will help you focus your research and scale
any technical hurdles you encounter.
Click here to view a list of previously submitted graduate capstone projects.
Back to top
|