Kim, D., & Solomon, M. G. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett.



Similar documents
MBA 6301, Business Ethics Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives. Credits.

Spiro, R. L., Rich, G. A., & Stanton, W. J. (2008). Management of a sales force (12th ed.). New York, NY: McGraw-Hill/Irwin.

MBA 5401, Management Information Systems Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

Shelly, G. B., & Campbell, J. T. (2012). Web design: Introductory (4th ed.). Boston, MA: Course Technology.

PSY 4680, Industrial Organizational Psychology Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social psychology (7th ed.). Upper Saddle River, NJ: Prentice Hall.

Reid, R. D., Bojanic, D. C. (2010). Hospitality marketing management (5th ed.). Hoboken, NJ: John Wiley & Sons, Inc.

BBA 4326, Procurement and Contract Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

Malhotra, N. K. (2010). Marketing research: An applied orientation (6th ed.). Upper Saddle River, NJ: Prentice Hall.

MBA 6081, Corporate Finance Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Goetsch, D. L. (2010). Construction safety and the OSHA standards. Upper Saddle River, NJ: Prentice Hall.

MBA 6931, Project Management Strategy and Tactics Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

Study of current trends in human resource training and development with application to diverse organization environments and labor practices.

Pozgar, G. (2012). Legal aspects of health care administration (11th ed.). Sudbury, MA: Jones & Bartlett.

Dorfman, M. S. (2008). Introduction to risk management and insurance (9th ed.). Upper Saddle River, NJ: Prentice Hall.

Shelly, G. B., & Campbell, J. T. (2012). Web design: Introductory (4th ed.). Boston, MA: Course Technology.

BBA 3210, Business Law Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. Course Structure

Worrell, W. A., & Vesilind, P. A. (2012). Solid waste engineering (2nd ed.). Stamford, CT: Cengage Learning.

Pedersen, P. M., Parks, J. B., Quarterman, J., & Thibault, L. (2011). Contemporary sport management (4th ed.). Champaign, IL: Human Kinetics.

DBA 9101, Comprehensive Exam Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

MBA 6001, Organizational Research and Theory Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

BBA 3201, Principles of Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

BCJ 4601, Criminal Justice Current Topics Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

Course Description Course Textbook Course Learning Outcomes Credits Course Structure Unit Learning Outcomes: Unit Lesson: Reading Assignments:

MBA 5101, Strategic Management and Business Policy Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes.

Horine, G. (2009). Absolute beginner's guide to project management (2nd ed.). Indianapolis, IN: Que Publishing.

MAR 4625, Direct Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Kotler, P., & Keller, K. L. (2012). Marketing management (14th ed.). Upper Saddle River, NJ: Prentice Hall.

BOS 3525, Legal Aspects of Safety and Health Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes.

HY 1010, Western Civilization I Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

MSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Guffey, M. E., & Loewy, D. (2015). Business communication: Process and product (8th ed.). Stamford, CT: Cengage Learning.

Moini, J. (2013). Focus on pharmacology: Essentials for health professionals (2nd ed.). Upper Saddle River, NJ: Prentice Hall.

HY 1120, American History II Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

Course Description Course Textbook Course Learning Outcomes Credits Course Structure Unit Learning Outcomes: Unit Lessons: Reading Assignments:

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

COURSE SYLLABUS BMIS 342 CYBER SECURITY

DIVISION OF NATURAL SCIENCES AND MATHEMATICS TIDEWATER COMMUNITY COLLEGE VIRGINIA BEACH CAMPUS COURSE PLAN

THE UNIVERSITY OF TEXAS AT BROWNSVILLE College of Education Syllabus

Course Title: ITAP 3471: Web Server Management

Four Top Emagined Security Services

Course Materials Required Text:

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

COURSE SYLLABUS SMGT 631 SPORT EVENT & FACILITY MANAGEMENT

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

School of Arts and Humanities PSYC610 Course Title: Multicultural Perspectives in Human Behavior. 3 Graduate Credit Hours 8 Weeks Prerequisites: None

BADM323: Information Systems for Business Professionals SU2016 Online Course

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Business Management MKT 829 International Sport Marketing

ASU Orientation: Remote Access Methods: Distance- Learning Orientation Course (RAM- D- LOC)

COURSE SYLLABUS CSCI 352 INFORMATION SECURITY OPERATIONS

Peru State College, Peru, NE. MGMT 602 Research Methods. Master of Science in Organizational Management. Syllabus Spring Semester 2014

BUSI 530 Managerial Finance Professor s Notes* As of July 15, 2007

CIS 56 (CRN: 33372) Hybrid Course Winter, 2016

BUSI 644 Human Resource Development Professor s notes* As of July 11, 2007

CIS 253. Network Security

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

EDUC 660. Organization and Administration of School Counseling Programs

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

etroy Course Syllabus BUS 3382 XTIA Business Communication Term 1, 2015 August 10 October 11, 2015

Online Course Syllabus CN315 Wide Area Networks

(Instructor-led; 3 Days)

How To Pass A Credit Course At Florida State College At Jacksonville

ECON-2105, Principles of Macroeconomics, 1rst Half Term, Spring/2016

Troy Online. Course Syllabus. BUS4474 Business and Society Term

JOHN JAY COLLEGE OF CRIMINAL JUSTICE CRJ / PAD 747 TECHNOLOGY APPLICATIONS IN PUBLIC MANAGEMENT AND CRIMINAL JUSTICE

School of Business and Nonprofit Management Course Syllabus

UNIVERSITY OF LA VERNE COLLEGE OF LAW. NEGOTIATION EVENING CLASS (Law 550, Section 2)

California State University, Chico School/Department Nursing 620: Advanced Nursing Research and Theory Fall 2013

MS Information Security (MSIS)

1. COURSE DESCRIPTION

TABLE OF CONTENTS CONTACTING CSU... 4 UNIT I: THE INTERNET AND DISTANCE LEARNING... 5 UNIT II: ENROLLMENT AND REGISTRATION... 8

etroy Abnormal Psychology 3304 TERM 1, 2015

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

PSYC 430 ABNORMAL PSYCHOLOGY

Network Security Policy

COURSE TEXTBOOK [Insert required course text academic format for book listing with ISBN# and edition]

Online course classroom: Please bookmark this site as you will need to log in regularly.

COURSE DESCRIPTION An overview of the current issues and trends in the field of education, specifically targeting the area of teaching and learning.

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

PSYC 414 COGNITIVE PSYCHOLOGY

AMBERTON UNIVERSITY e-course SYLLABUS **This course will be administered via an alternative learning management system**

HEALTH CARE ADMINISTRATION 101 INTRODUTION TO HEALTH CARE ADMINISTRATION FALL SEMESTER 2015

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

AMBERTON UNIVERSITY e-course SYLLABUS

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

CISA TIMETABLE (4 DAYS)

STUDENT HANDBOOK Trent Online

SOUTHEAST MISSOURI STATE UNIVERSITY. The Teacher as Competent Professional Educator

X Network, Operating System, and Database Security. Fall 2014, Registration Number W. UCLA EXTENSION: Computer Science.

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York

PSY 303, Mehta, Spring 2014 Page 1

SCHOOL OF EDUCATION VIRTUAL CAMPUS

Master of Arts in English Language Learning for Grade PreK 12 Teachers

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

Colorado Women s College of the University of Denver. FSEM 1515: Critical Thinking and Decision Making

COURSE SYLLABUS HLTH 620 INTRODUCTION TO GLOBAL HEALTH

THE UNIVERSITY OF TEXAS AT BROWNSVILLE College of Education Syllabus

MBA 6410 Strategic Global Marketing 3 Credit Hours Milton Fall Term 2, 2014

Transcription:

ITC 4390, Internet and Network Security Course Syllabus Course Description Practical examination of information security fundamentals. Includes security planning, technologies, and personnel issues. Covers material helpful in the preparation for the Security+ certification exam. Course Textbook Kim, D., & Solomon, M. G. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett. Course Learning Objectives Upon completion of this course, students should be able to: 1. Discuss the dimensions of threat to an organization's mission in a globally networked environment and the implications of interconnectivity. 2. Examine the types and ranges of current vulnerabilities and threats to which an organization's information assets may be exposed. 3. Describe the inter-relationships among mission, information assets, threats to those assets, and infra-structure vulnerabilities. 4. Explain organizational information risk management approaches that can be integrated into the on-going business management practices of an enterprise. 5. Describe the application of state-of-the-practice techniques for protecting information. 6. Identify mission-oriented protection strategies, such as information survivability. 7. Facilitate policy and resource decisions related to information technology security. 8. Develop a contextual framework as a touchstone for planning and implementing information security management. 9. Develop an approach for staying current with trends and requisite skills in information security. Credits Upon completion of this course, the students will earn three (3) hours of college credit. Course Structure 1. Unit Learning Objectives: Each unit contains Unit Learning Objectives that specify the measurable skills and knowledge students should gain upon completion of the unit. 2. Written Lectures: Each unit contains a Written Lecture, which discusses lesson material. 3. Reading Assignments: Each unit contains Reading Assignments from one or more chapters from the textbook. Supplemental Readings are provided Units II and VIII to aid students in their course of study. 4. Key Terms: Key Terms are intended to guide students in their course of study. Students should pay particular attention to Key Terms as they represent important concepts within the unit material and reading. 5. Unit Assessments: This course contains four Unit Assessments, one to be completed at the end of Unit II, IV, VI, and VII. Assessments are composed of multiple-choice questions and written response questions. 6. Unit Assignments: Students are required to submit for grading Unit Assignments in Units I-VI. Specific information and instructions regarding these assignments are provided below. 7. Final Exam (Proctored): Students are to complete a Final Exam in Unit VIII. All Final Exams are proctored see below for additional information. You are permitted four (4) hours to complete this exam, in the presence of your approved proctor. This is an open book exam. ITC 4390, Internet and Network Security 1

8. Ask the Professor: This communication forum provides you with an opportunity to ask your professor general or course content related questions. 9. Student Break Room: This communication forum allows for casual conversation with your classmates. Unit Assignments Unit I Project Create a 7-10 slide presentation on Information Systems Security and IT infrastructure. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function. Definition of Information Systems Security and the three tenants of ISS The seven domains and the layered security approach Data classification of an IT infrastructure Explanation of how the IT security policy framework is used to reduce risks and threats. Unit II Project Create a 5-7 slide presentation on Risk Management Planning. You may use various sources including your textbook. Be sure to cite any sources used in a separate reference slide with proper APA formatting. (Cover and reference slide do not count). You may also use the slide notes function to explain slide contents as necessary. Your presentation should include the following: Definition of Risk Management A-I-C Compliance Qualitative and Quantitative Risk Analysis Risk Response Planning Implementation of a BIA, BCP and DRP Unit III Project Create a 5-7 slide presentation on Access Controls. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. Define the four parts of Access Controls. Discuss two phases of Access Control. Describe three Authentication Types. Explain how the use of authentication types techniques impact security. Unit IV Project Create a 5-7 slide presentation on the Security Audit process. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. Describe the risk review activities. Identify the four organizational permission levels. Define the purpose of a security audit. Discuss the six phases of a security audit plan. Unit V Project Create a 5-7 slide presentation on the keyword mixed alphabet cipher. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. ITC 4390, Internet and Network Security 2

Explain how the cipher works. Identify the three elements that ensure the security of the cipher. Include an example of the cipher process by creating a unique keyword and encrypting the following plaintext message. Plaintext: IT SECURITY IS CRITICAL Unit VI Project Create a 5-7 slide presentation on the network types. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. Describe and provide diagram of a local area network (LAN). Describe and provide a diagram of a wide area network (WAN). Discuss the placement and purpose of routers, switches and firewalls in both configurations. APA Guidelines CSU requires that students use the APA style for papers and projects. Therefore, the APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed. A document titled APA Guidelines Summary is available for you to download from the APA Guide Link, found in the Learning Resources area of the mycsu Student Portal. It may also be accessed from the Student Resources link on the Course Menu. This document provides links to several internet sites that provide comprehensive information on APA formatting, including examples and sample papers. CSU Grading Rubric for Papers/Projects The course papers will be graded based on the CSU Grading Rubric for all types of papers. In addition, all papers will be submitted for electronic evaluation to rule out plagiarism. Course projects will contain project specific grading criteria defined in the project directions. To view the rubric, click the Academic Policies link on the Course Menu, or by accessing the CSU Grading Rubric link, found in the Learning Resources area of the mycsu Student Portal. Final Examination Guidelines Final Exams are to be administered to students by an approved Proctor. CSU approves two, flexible proctoring options: a standard Proctor, who is chosen by the student and approved by the university, or Remote Proctor Now (RP Now), an ondemand, third-party testing service that proctors examinations for a small fee. A standard Proctor is an unbiased, qualified individual who is selected by the student and agrees to supervise an examination. You are responsible for selecting a qualified Proctor, and the Proctor must be pre-approved by CSU. Students choosing RP Now must have an operational webcam/video with audio, a high-speed internet connection, and the appropriate system rights required to download and install software. To review the complete Examination Proctor Policy, including a list of acceptable Proctors, Proctor responsibilities, Proctor approval procedures, and the Proctor Agreement Form, go to the mycsu Student Portal from the link below. http://mycsu.columbiasouthern.edu You are permitted four (4) hours to complete this exam, in the presence of your approved Proctor. This is an open book exam. Only course textbooks and a calculator, if necessary, are allowed when taking proctored exams. ITC 4390, Internet and Network Security 3

Communication Forums These are non-graded discussion forums that allow you to communicate with your professor and other students. Participation in these discussion forums is encouraged, but not required. You can access these forums with the buttons in the Course Menu. Instructions for subscribing/unsubscribing to these forums are provided below. Once you have completed Unit VIII, you MUST unsubscribe from the forum; otherwise, you will continue to receive e-mail updates from the forum. You will not be able to unsubscribe after your course end date. Click here for instructions on how to subscribe/unsubscribe and post to the Communication Forums. Ask the Professor This communication forum provides you with an opportunity to ask your professor general or course content questions. Questions may focus on Blackboard locations of online course components, textbook or course content elaboration, additional guidance on assessment requirements, or general advice from other students. Questions that are specific in nature, such as inquiries regarding assessment/assignment grades or personal accommodation requests, are NOT to be posted on this forum. If you have questions, comments, or concerns of a nonpublic nature, please feel free to email your professor. Responses to your post will be addressed or emailed by the professor within 48 hours. Before posting, please ensure that you have read all relevant course documentation, including the syllabus, assessment/assignment instructions, faculty feedback, and other important information. Student Break Room This communication forum allows for casual conversation with your classmates. Communication on this forum should always maintain a standard of appropriateness and respect for your fellow classmates. This forum should NOT be used to share assessment answers. Grading Assessments (4 @ 8%) = 32% Assignments (6 @ 7%) = 42% Final Exam = 26% Total = 100% Course Schedule/Checklist (PLEASE PRINT) The following pages contain a printable Course Schedule to assist you through this course. By following this schedule, you will be assured that you will complete the course within the time allotted. ITC 4390, Internet and Network Security 4

ITC 4390, Internet and Network Security Course Schedule By following this schedule, you will be assured that you will complete the course within the time allotted. Please keep this schedule for reference as you progress through your course. Unit I Information Security and Communication Chapter 1: Information Systems Security Chapter 2: Changing How People and Businesses Communicate Unit II Attacks, Threats and IS Business Drivers Chapter 3: Malicious Attacks, Threats, and Vulnerabilities Chapter 4: The Drivers of the Information Security Business Supplemental Reading: See Study Guide Proctor Approval Form Unit III Access Controls, Security Operations and Administration Chapter 5: Access Controls Chapter 6: Security Operations and Administration ITC 4390, Internet and Network Security 5

ITC 4390, Internet and Network Security Course Schedule Unit IV Security Policies and Procedures; Auditing to Recovery Chapter 7: Auditing, Testing, and Monitoring Chapter 8: Risk, Response, and Recovery Unit V Cryptography Chapter 9: Cryptography Unit VI Networks, Telecommunications, Malicious Code, and Activity Chapter 10: Networks and Telecommunications Chapter 11: Malicious Code and Activity ITC 4390, Internet and Network Security 6

ITC 4390, Internet and Network Security Course Schedule Unit VII Information Security Standards, Education and Training Chapter 12: Information Security Standards Chapter 13: Information Security Education and Training Request to take Final Exam Unit VIII Information Security Professional Certification and U.S. Compliance Laws Chapter 14: Information Security Professional Certifications Chapter 15: U.S. Compliance Laws Supplemental Reading: See Study Guide Final Exam ITC 4390, Internet and Network Security 7