Ferreira Logo

Ferreira's Gentle Sailing Web Site

BCC Logo Home CIS111 CIS132 CIS134 CIS158 CIS271 CIT150 CIT252


CIT150 - Network Security

Security Image
Welcome to Security+

Returned Assignments


May 16, 2017, 3:30 pm


May 16, 2017, 3:30 pm
Look Around

Everything that you need to know about this course is on this site.  This includes policies, assignments, quizzes, and much more information. Look around and get to know it well.

This course will also make use of eLearning. Please make sure you visit it regularly.


Final Grades

Final Grades have been posted on AccessBCC and should be available for viewing on May 17, 2017

Essential Security Certificates

In his article, Essential certifications for smart security pros, Roger Grimes presents a list of sought after security certifications and makes a case for each.

Hottest Job in IT

"In a tight job market, security pros are paid well, rate job satisfaction high, and will make a move for money, according to Survey: With all eyes on security, talent shortage sends salaries sky high.
Digging into the data, we find that information security manager is the hottest job in IT"
Salary Survey 2016: How does your compensation stack up?
        By Amy Bennett, CSO, InfoWorld

Encryption is not the enemy

"Our politicians help the terrorists every time they use fear as a campaign tactic.... The surest defense against terrorism is to refuse to be terrorized. Our job is to recognize that terrorism is just one of the risks we face, and not a particularly common one at that. And our job is to fight those politicians who use fear as an excuse to take away our liberties and promote security theater that wastes money and doesn't make us any safer. " Security expert Bruce Schneier as quoted by Caroline Craig, InfoWorld - Read More

Take a look. What do you think? Come prepared to discuss.

After Paris: Liberté demands unlimited encryption

"The neocons are at it again: After the tragedies of the terrorist attacks in Paris last Friday (and Beirut the day before), they're arguing that governments need to be able to access all communications from everyone, purportedly to protect us from future terrorist attacks" By Galen Gruman, InfoWorld - Read More

Take a look. What do you think? Come prepared to discuss.

NSA uses the vulnerabilities to make its own cyber-attacks

"The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies open to cyber attacks, said last week that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time. -- " Reuters - Read More

Take a look. What do you think? Come prepared to discuss.

Revealed: how US and UK spy agencies defeat internet privacy and security

"US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden." The Guardian - Read More

Take a look. What do you think? Come prepared to discuss.


Security+ Guide to Network Security

5th Edition
by Mark Ciampa
Course Technology, Cengage Learning
ISBN 13 : 978-1-305-09391-1
  ISBN 10 : 1-305-09391-7

Cengage Brain .

Remember, this is a dynamic website.  Visit often.