Information Security Engineers
Develop and oversee the implementation of information security designs. Plan and design robust security architectures.
Representative task statements
Paraphrased from the O*NET record for this SOC code.
- Develop response plans for potential network intrusions.
- Perform risk assessments for information security.
EWU courses that prepare for this occupation
CSCD210
CSCD 210 — Programming Principles I
CSCD211
CSCD 211 — Programming Principles II
CSCD300
CSCD 300 — Data Structures
CSCD330
CSCD 330 — Data Communications and Networks
CSCD350
CSCD 350 — Software Engineering Principles
CSCD379
CSCD 379 — Cybersecurity I: Foundations
CSCD380
CSCD 380 — Cybersecurity II: Systems and Operations
CSCD411
CSCD 411 — Secure Software Engineering
CSCD432
CSCD 432 — Computer Networks II
CSCD434
CSCD 434 — Network Security
CSCD438
CSCD 438 — Vulnerability Analysis
CSCD496
CSCD 496 — Senior Capstone
Exam questions tagged to this occupation
- CSCD240-E1-A-Q41 setuid Explain the setuid bit in 1-2 sentences using the term "effective user ID".
- CSCD240-E1-B-Q11 harden Remove setuid bit from /opt/app/runner without changing other permissions.
- CSCD240-E1-B-Q13 harden Recursively set permissions on ~/secrets/ so only owner has any access.
- CSCD240-E1-C-Q04 setuid A -rwsr-xr-x file owned by root. Execution causes what?
- CSCD240-E1-C-Q23 harden Remove the setuid bit from /opt/svc/agent using symbolic form, leaving other perms.
- CSCD240-E1-C-Q24 harden Recursively change perms under ~/secrets so group and other have no access.