CIS 253. Network Security

Size: px
Start display at page:

Download "CIS 253. Network Security"

Transcription

1 CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011

2 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum Sub-committee: 5/6/2011 Purpose: New _X_Change Retire If this is a change, what is being changed? (Check ALL that apply) Update Prefix Title Learning Units _X Competencies Format Change _X_ Course Description Course Number _X_ Textbook Credits Prerequisite Effective Semester/Year Fall 2011 Spring 20 Summer 20 COURSE INFORMATION Prefix & Number: Title: CIS 253 Network Security Catalog Course Description: This course presents network security concepts and discusses the tools and techniques necessary to safeguard computer stored data. Credit Hours: 3 Prerequisite(s) Lecture Hours: Lab Hours: 3 0 Prerequisite CIS 153 Network Essentials or Permission of Academic Chair Co-requisite(s) Does this course need a separately scheduled lab component? Yes Does this course require additional fees? If so, please explain. Yes X No X No Is there a similar course in the course bank? Yes (Please identify.) _X No Articulation: Is this course or an equivalent offered at other two and four-year universities in Arizona? No _X Yes (Identify the college, subject, prefix, number and title: Elective credit to ASU and NAU

3 Writing Across the Curriculum Rationale: Mohave Community College firmly supports the idea that writing can be used to improve education; students who write in their respective content areas will learn more and retain what they learn better than those who don t. Courses in the core curriculum have been identified as Writing Across the Curriculum courses. Minimum standards for the Writing Across the Curriculum riculum component are: 1. The writing assignments should total words. For example, a single report which is 1500 words in length OR a series of essay questions and short papers (example: four 375-word assignments) which total 1500 words could meet the requirement. 2. The writing component will represent at least 10% of a student s final grade in the course. Is this course identified as a Writing Across the Curriculum course? Yes X No (See addendum for writing rubrics) Intended Course Goals By the end of the semester, students will be able to: 1. Define security principles and recommended security baselines to assist organizations in defending against attacks on their networked computer systems and mobile systems such as tablets, netbooks and smart phones. 2. Through security policy and procedures, protect both internal and external communications from unauthorized access. 3. Identify the types of basic attacks, i.e. password guessing, social engineering, and identity attacks, and the best procedures to guard against these intrusions. 4. Use effective authentication methods including usernames and passwords, biometrics, and multifactor authentication methods. 5. Describe the steps necessary to secure a network infrastructure using security zones and Virtual Local Area Networks (VLANs). 6. Use Cryptography to create digital signatures and encryption so that information cannot be viewed by unauthorized users when it is transmitted or stored. 7. Design a security policy that includes a password management policy, privacy policy, and acceptable use policy (AUP). Course Competencies and Objectives By the end of the semester, students will be able to:

4 Competency 1 Define information security and identify the critical challenges for information security professionals Objective 1.1 List and define information security terminology Objective 1.2 List the challenges for security personnel when protecting a network from attacks including the speed of attacks, distributed attacks, and the need for faster detection of weaknesses Objective 1.3 Describe the general roles available in information security careers including security management, security engineering, and security administration. Competency 2 Describe attackers and their motives for harming systems that store, process, and exchange that information Objective 2.1 Develop attacker profiles Objective 2.2 Describe basic attacks and identity attacks Objective 2.3 Identify denial of service attacks Competency 3 Describe the basic principles for designing a secure system which includes access control, authentication, and auditing Objective 3.1 Describe security principles such as layering and obscuring critical data Objective 3.2 Use effective authentication methods Objective 3.3 Control access to computer systems and audit information security schemes Objective 3.4 List the steps necessary to disable nonessential systems and ensure updates to systems are conducted on a routine basis Competency 4 Create policies to protect the network and organizational infrastructure Objective 4.1 Design and/or document a network topology of an organization Objective 4.2 Secure removable media by establishing security policies and procedures Objective 4.3 Define a VLAN Virtual Local Area Network and its advantages and disadvantages when addressing security concerns Objective 4.4 Construct a security zone to separate secure users from outsiders Objective 4.5 Describe security provisions and unique security features needed for tablets, netbooks, smart phones, and other mobile devices. Competency 5 Develop the procedures necessary to protect electronic communication Objective 5.1 Define the common attacks of systems including malware, spam, and hoaxes Objective 5.2 Define repurposed programming or using programming tools in ways more harmful than for what they were originally intended as it relates to Web attacks Objective 5.3 Describe the steps necessary to protect Web communications using Secure Sockets Layer/Transport Layer Security protocol Objective 5.4 Define tunneling protocols as the technique of encapsulating one packet of data within another type to create a secure link of transportation, Competency 6 Explain cryptography concepts and define the terminology of encryption Objective 6.1 Define cryptography and security procedures using hashing algorithms Objective 6.2 List the steps to protect data with symmetric and asymmetric encryption algorithms Objective 6.3 Develop a digital signature to secure communication data Objective 6.4 Explain cryptography strengths and vulnerabilities Competency 7 Develop an operational security plan Objective 7.1 List the three most important procedures for developing a security plan, 1) establish a physical security perimeter, 2) establish a business continuity plan, and 3) plan for disaster recovery Objective 7.2 Define two types of defenses that are commonly referenced when shielding wireless signals: Telecommunications Electronics Material Protected from Emanating Spurious Transmissions, or TEMPEST and Faraday cage. Objective 7.3 Construct a disaster recovery plan (DRP) that addresses what to do if a major catastrophe occurs that could cause the organization to cease functioning

5 Competency 8 Develop a security policy for protecting computer information systems in an organization Objective 8.1 Design a security policy and that includes compliance monitoring and evaluation Objective 8.2 Describe the security policy cycle Objective 8.3 Define types of security policies including acceptable use policy, human resource policy, password management policy, privacy policy, disposal and destruction policy, and service-level agreement Competency 9 Develop a security management plan Objective 9.1 Define identity management and digital rights management Objective 9.2 Develop an effective training and education program for users Objective 9.3 Create a plan that considers changes in system architecture and classifications of sensitive documents Competency 10 Describe security careers and the skills necessary to become a security professional Objective 10.1 Define computer forensics and the proper response to an incident Objective 10.2 List information security jobs and skills Objective 10.3 Describe host intrusion prevention (HIP) and behavior blocking as two of the latest defenses in network security Teacher s Guide Course Textbook, Materials and Equipment Textbook(s) Title Security + Guide to Network Security Fundamentals, 4th ed. or most recent edition Author(s) Ciampa Publisher Course Technology ISBN Software/ Equipment Textbook Costs Title Author(s) Publisher ISBN Please indicate how much the textbook would cost if purchased through Barnes & Noble: $ Modality _X On-ground _X On-line Course Assessments Description of Possible Course Assessments (Essays, multiple choice, etc.) Exams standardized for this course? Midterm Final Other (Please specify): Are exams required by the department? Yes _X No If Yes, please specify: Where can faculty members locate or access the required

6 standardized exams for this course? (Contact Person and Location) Example: NCK Academic Chair Office Student Outcomes: Identify the general education goals for student learning that is a component of this course. Check all that apply: 1. Communicate effectively. a. Read and comprehend at a college level. b. Write effectively in a college setting. Method of Assessment Create a security procedures document for institutional policy. 2. Demonstrate effective quantitative reasoning and problem solving skills. 3. Demonstrate effective qualitative reasoning skills. Present solutions to case problems involving data security policies and procedures. 4. Apply effective methods of inquiry. a. Generate research paper by gathering information from varied sources, analyzing data and organizing information into a coherent structure. b. Employ the scientific method. 5. Demonstrate sensitivity to diversity a. Experience the creative products of humanity. b. Describe alternate historical, cultural, global perspectives.

CIS 156. Firewalls and Intrusion Detection

CIS 156. Firewalls and Intrusion Detection CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal

More information

CIS 270. Systems Analysis and Design

CIS 270. Systems Analysis and Design CIS 270 Systems Analysis and Design Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to

More information

MEA 116. Electronic Medical Records. Course Package

MEA 116. Electronic Medical Records. Course Package MEA 116 Electronic Medical Records Course Package Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue

More information

CIS 241 INTRODUCTION TO E-COMMERCE

CIS 241 INTRODUCTION TO E-COMMERCE CIS 241 INTRODUCTION TO E-COMMERCE APPROVED 11/09/2011 EFFECTIVE FALL 2012-13 Prefix & Number CIS 241 Course Title: E-Commerce Technology Purpose of this submission: New Change/Updated Retire If this is

More information

PAR 201. Legal Research and Writing II. Course Package

PAR 201. Legal Research and Writing II. Course Package PAR 201 Legal Research and Writing II Course Package Approved November 5, 2010 Effective Spring 2011 COURSE PACKAGE FORM Team Leader and Members Date of proposal to Curriculum Sub-committee: Candace Hofstadler

More information

MEA 141. Medical Billing. Course Package

MEA 141. Medical Billing. Course Package MEA 141 Medical Billing Course Package Approved: December 3, 2010 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue Date of proposal

More information

MEA 130 MEDICAL CODING I (ICD-10-CM)

MEA 130 MEDICAL CODING I (ICD-10-CM) MEA 130 MEDICAL CODING I (ICD-10-CM) PRESENTED FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 130 Course Title: Medical Coding I ICD-10-CM Purpose of this submission: New Change/Updated Retire

More information

CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT

CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 270 Course Title: Clinical Strategies in Substance Abuse Treatment

More information

CHD 246 CO-OCCURRING DISORDERS

CHD 246 CO-OCCURRING DISORDERS CHD 246 CO-OCCURRING DISORDERS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 246 Course Title: Co-Occurring Disorders Purpose of this submission: New Change/Updated

More information

CIS 280. Computer Information Systems Internship. Course Package

CIS 280. Computer Information Systems Internship. Course Package 1 CIS 280 Computer Information Systems Internship Course Package Approved August 6, 2009 2 COURSE PACKAGE FORM Contact person(s) Andra Goldberg & Matt Butcher Date of proposal to Fall 2009 Curriculum Committee

More information

BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS

BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUE130 Course Title: Financial Management for Entrepreneurs Purpose of this submission:

More information

BUS 221 FINANCIAL ACCOUNTING

BUS 221 FINANCIAL ACCOUNTING BUS 221 FINANCIAL ACCOUNTING PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number BUS 221 Course Title: Financial Accounting Purpose of this submission: New X Change/Updated Retire

More information

MEA 110 ADMINISTRATIVE MEDICAL ASSISTING

MEA 110 ADMINISTRATIVE MEDICAL ASSISTING MEA 110 ADMINISTRATIVE MEDICAL ASSISTING PRESENTED: FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 110 Course Title: Administrative Medical Assisting Purpose of this submission: New Change/Updated

More information

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE Presented and Approved: December 7, 2012 Effective: Fall 2013-14 Prefix & Number AJS 101 Course Title: Introduction to Administration of Justice Purpose

More information

ASE 133 AUTO HVAC SYSTEMS

ASE 133 AUTO HVAC SYSTEMS ASE 133 AUTO HVAC SYSTEMS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number ASE 133 Course : Auto HVAC Systems Purpose of this submission: New Change/Updated Retire If this

More information

BUS 204 BUSINESS COMMUNICATIONS

BUS 204 BUSINESS COMMUNICATIONS BUS 204 BUSINESS COMMUNICATIONS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUS 204 Course Title: Business Communications Purpose of this submission: New Change/Updated

More information

ENG 136 TECHNICAL PROFESSIONAL WRITING

ENG 136 TECHNICAL PROFESSIONAL WRITING ENG 136 TECHNICAL PROFESSIONAL WRITING PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE - FALL 2012-13 Prefix & Number ENG 136 Course Title: Technical/Professional Writing Purpose of this submission: Update

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

ACC 135. Course Package

ACC 135. Course Package 1 ACC 135 Accounting Systems and Procedures Course Package Approved August 6, 2009 2. COURSE PACKAGE FORM Contact person(s) Dr. Eric Aurand, Dr. James Childe Date of proposal to Fall 2009 Curriculum Committee

More information

HVA 120 RESIDENTIAL HVAC INSTALLATION

HVA 120 RESIDENTIAL HVAC INSTALLATION HVA 120 RESIDENTIAL HVAC INSTALLATION PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number HVA 120 Course Title: Residential HVAC Installation Purpose of this submission: New

More information

DAE 115. Office Management for the Dental Assistant. Course Package

DAE 115. Office Management for the Dental Assistant. Course Package DAE 115 Office Management for the Dental Assistant Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee: Kathleen R. Baleno February

More information

INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14. MCC Form EDU 0007 (rev.

INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14. MCC Form EDU 0007 (rev. AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number AJS 225 Purpose of this submission: To update format, add Writing Across the Curriculum component, and

More information

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:

More information

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

How To Pass A Credit Course At Florida State College At Jacksonville

How To Pass A Credit Course At Florida State College At Jacksonville Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

NAP 117 MEDICATION ASSISTANT COURSE

NAP 117 MEDICATION ASSISTANT COURSE NAP 117 MEDICATION ASSISTANT COURSE APPROVED: JANUARY 12, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number NAP 117 Course Title: Medication Assistant Course Purpose of this submission: New Course New Change/Updated

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Curran, K. Tutorials. Independent study (including assessment) N/A

Curran, K. Tutorials. Independent study (including assessment) N/A MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

The Information Security Problem

The Information Security Problem Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

BIO 201 ANATOMY AND PHYSIOLOGY I with LAB

BIO 201 ANATOMY AND PHYSIOLOGY I with LAB BIO 201 ANATOMY AND PHYSIOLOGY I with LAB (Title change ONLY Oct. 2013) Presented and Approved: January 12, 2012 Effective: 2012-13 FA Prefix & Number BIO 201 Course Title: Anatomy and Physiology I Purpose

More information

CISA TIMETABLE (4 DAYS)

CISA TIMETABLE (4 DAYS) CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology

More information

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Eleventh Hour Security+

Eleventh Hour Security+ Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

Commercial/Industrial Electricity

Commercial/Industrial Electricity 1 ELC 210 Commercial/Industrial Electricity Course Package Presented and Approved July 31, 2008 2 Contact person(s) DAVE WHITE Date of proposal to JULY 31, 2008 Curriculum Committee NEW COURSE PACKAGE

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CNA 432/532 OSI Layers Security

CNA 432/532 OSI Layers Security CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: [email protected] Office Hrs: 3-4 MW, Office: ECC256 Other

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11. Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2662 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Voice Over IP CTS 2655 and CNT 2102 with grade

More information

New York City College of Technology Computer Systems Technology Department

New York City College of Technology Computer Systems Technology Department New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Exam 1 - CSIS 3755 Information Assurance

Exam 1 - CSIS 3755 Information Assurance Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Course Design Document. IS403: Advanced Information Security and Trust

Course Design Document. IS403: Advanced Information Security and Trust Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...

More information

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497

BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497 CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.

More information

Information Security Course Specifications2011-2012

Information Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: [email protected] URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

Lecture II : Communication Security Services

Lecture II : Communication Security Services Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

Physical Development for Preschool, Toddlers and Their Parents

Physical Development for Preschool, Toddlers and Their Parents CDA 102A Physical Development Course Package/Modification/Retirement NEW Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee:

More information

An expert s tips for cracking tough CISSP exam

An expert s tips for cracking tough CISSP exam 35 / 83 Chapter 6 An expert s tips for cracking tough CISSP exam Rahul Kokcha, an experienced instructor for CISSP explains how to prepare for the CISSP exam, what are important topics, and what you do

More information