Course Description
Assessment and analysis of database best practices that include: data security policy, access control, intrusion detection, data obscurity, fraud detection, encryption, virtual private databases and physical security.
Credit(s)
3.0
Professor of Record
Name Here
Course Syllabus
(Show as attachment or a link to One-drive)
This syllabus applies to all sections of this course.
Or
There are multiple sections of this course. Each section has its own syllabus.
List the sections here as embedded links to OneDrive
Course Details
Place any information – if none, delete this section
What should be here:
how often this course if offered
This information can be pulled or linked directly from OneDrive (files that PoR saves there)
Other iSchool Courses
Unable to render {children}. Page not found: iSchool Graduate Courses.