Data Security

the protection of data at rest, during processing, and in transit.

Data Security:


Access Control, Foundations: This module introduces access control foundations, starting with identifying the assets and information that are needed to be access-controlled and then introducing identifying the physical and logical access controls.

Access Control Lists, Advanced: This module discusses the types and applications of access controls. Access controls can be used to admit users into trusted areas such as information systems, computer rooms and even the entire organization. Access controls typically include a group of policies, programs and technologies.

Asymmetric Encryption, Fundamentals: This module introduces students to asymmetric cryptography fundamentals, reviews the math behind asymmetric and Public Key encryption, and provides implementation examples from common libraries.

Asymmetric Encryption, Advanced: This module covers advanced asymmetric encryption algorithms that use public keys to encrypt and private keys to decrypt data.

Cryptography, Explorations: This module covers/introduces the history of cryptography, cryptographic theory, and practical applications of cryptography.

Cryptography, Foundations: This module covers the Study of symmetric encryption, Plaintext, cipher structure, structure and function of Data Encryption Standard (DES), Advanced Encryption Standard (AES), and decryption.

Cryptography, Advanced: This module covers tools, mathematical ideas, complexity theoretic principles, privacy, and digital signature algorithms for complete understanding of advanced cryptographic methods.

Digital Forensics: This module introduces digital forensics and how it plays a role in modern society. Students will also get hands-on experience with several free-to-use digital forensics tools that will allow them to expand their understanding of the subject and gain valuable experience.

Symmetric Encryption, Fundamentals: This module introduces students to symmetric cryptography encryption and explains one of the most secure symmetric encryption algorithms used nowadays Advanced Encryption standard (AES).

Mobile Security: This module covers what mobile device security is and why its important.  It also reviews threats, vulnerabilities, and associated risk mitigation strategies and when legislation and regulation may apply.  Policy and software implementation and maintenance for mobile device security is also explained.

Web Security, Introduction: This module offers an introduction to Internet concepts and World Wide Web concepts as foundational knowledge to understand web application security. It also provides background knowledge about the Open Web Application Security Project (OWASP) and the OWASP Top 10 Security Risks.

Business Implications of Cryptography: This module explains Transport Layer Security (TLS), its version history and the important role it plays in securing today’s businesses.  A part of this module focuses on implementing of Secure Socket Layer (SSL) on Apache web server to secure messages between the browser and server.


If you are external to the Minnesota State System, please complete the Interest Form.

Access: 1.) Click below to be redirected to D2L and sign on with your StarID and password. Then, select Self-Registration and choose from the ITCOE courses listed. 2.) If you are external to the Minnesota State System, please complete the Interest Form below.

Click Here to Go to D2L