Help

Course Information

Information Security (CIS 286)

Term: 2020-2021 School Year Fall Term

Faculty

Mr. Todd T Wohlwend
Email address is hidden, click here to email

OFFICE HOURS:

Monday-Thursday 8:30AM-9:00AM and 12:30PM-1:00PM

Friday 10:00AM-11:00AM online (Teams)

Contact Information:

Phone - (605)367-5562

Email - Todd.Wohlwend@southeasttech.edu

STC Instructor BIO

B. Todd Wohlwend, Computer Information Systems Networking Instructor, has 30+ years of professional computer experience that includes desktop, network administration, system administration, and general computer security support.  He has earned Bachelors and Masters degrees at South Dakota State University.  He also holds several computer related certifications such as Network+, RHCT, RHCSA, Unifi and CNA.  As an instructor, Todd teaches many introductory and upper level CIS classes at Southeast Technical College which include, Windows Server, Linux Administration, Wireless Data Communications, Server Virtualization, System and Network Security, and Internet Systems Scripting.  He is a skilled network and systems administration professional who specializes in keeping up on current and future computing technologies.

STC Position:

CIS System and Network Security Instructor

Degrees:

BAEET - Bachelors in Electronic Engineering Technology

MSIM - Masters in Industrial Management

Certifications:

RHCT - Red Hat Certified Technician

Network+ - CompTIA Network+

RHCSA - Red Hat Certified System Administrator

Unifi - A multitude of Ubiquiti/Unifi certifications

Description

This course is an introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Students will be exposed to the spectrum of Security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses and an overview of the Information Security Planning and Staffing functions.