The rapid growth of network technology and services continues to transform human culture in a new generation of Internet users, who collectively make up roughly half of the world's population. Courses in this category educate students in the secure use of technology with an understanding of the personal and social implications.

Summary

The rapid growth of network technology and services continues to transform human culture in a new generation of Internet users, who collectively make up roughly half of the world's population. Wired and wireless network devices are modern essentials for communication, social interaction, education, commerce, entertainment, employment and government. Consider, however, that the exact same technology is used as a vehicle for gambling, pornography, any kind of non-physical abuse, crime, terrorism, surveillance (legally sanctioned or not), and warfare. This calls for wisdom!

The Information Security class trains students to understand the essential goals of confidentiality, integrity, availability, and accountability as they relate to technology, while personally maintaining godliness, personal liberty, privacy, and safety. The building blocks are as follows:

  1. A foundation of biblical ethics and values

  2. Learning the basic design of computer and network technology, including desktop, laptop, and handheld devices; operating systems; network devices; wired and wireless networks and common network protocols; and networked applications on local- and wide-area networks

  3. Studying the design and use of common security concepts such as authentication, authorization, encryption, layered security, fault tolerance, disaster recovery, malware and vulnerability detection, firewalls, threats, attacks, and incident response

  4. Implementing the concepts described above through hardened systems, backups, encrypted communication, security assessments, and the study of how vulnerabilities are exploited

  5. Adopting a security mindset for recognizing potential vulnerabilities in the way things work, and forming habitual practices that decrease or eliminate the risks involved in entrusting personal data to vulnerable information systems

  6. Making a commitment to a personal security policy for safe and secure Internet use

  7. Becoming a security practitioner that benefits others

About CHAT

For information about the Christian Homeschool Academy of Tutoring, please visit the CHAT website.

Class Details

CHAT Information Security meets Wednesdays from 9:00-10:30AM at Grace Church in classroom 213.