RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals



Similar documents
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 233 INTRODUCTION TO PHP

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 103 Computer Concepts and Programming

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 102 COMPUTER LITERACY

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MRKT-101 PRINCIPLES OF MARKETING

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. HLTH 102 Certified Nurse Aide (CNA)

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MATH 102 PROBLEM SOLVING STRATEGIES IN MATHEMATICS

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. Accounting Systems and Software ACCT-225

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE INTRODUCTION TO HEALTH INFORMATION TECHNOLOGY HITC - 105

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MATH 111H STATISTICS II HONORS

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ENVI-102: Environmental Science and Sustainability

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MATH 251 CALCULUS III

RARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT. CISY Computer Literacy

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. BIOL Human Anatomy and Physiology II

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HMNS 213 ADVANCED COUNSELING SKILLS

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE NURS 130: NURSING TRANSITIONS

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. BIOL Human Anatomy and Physiology I

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. CISY 105 Foundations of Computer Science

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTS 274: Visual Design For The Web

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTS 248: Designing Motion Graphics

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTS 246: Visual Design I

RARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT. CISY-294, Oracle: Database Administration Fundamentals Part I

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. MATC-121 Clinical Medical Assistant Principles

Raritan Valley Community College Academic Course Outline MUSC DIGITAL MUSIC COMPOSITION I

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTH History of Photography

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE REAL ESTATE TRANSACTIONS LEGL-122

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE COMPUTER APPLICATIONS IN THE LAW OFFICE LEGL-130

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ENGL 226 Introduction to Poetry

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HIST 202 H UNITED STATES HISTORY: 1877 TO PRESENT (HONORS)

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE FREN 201 INTERMEDIATE FRENCH I

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE NURS 124: NURSING OF FAMILIES WITH CHILDREN

Course Title: ITAP 3471: Web Server Management

Raritan Valley Community College Academic Course Outline. HMNS 240 Introduction to Special Education

Information Security Course Specifications

Raritan Valley Community College Academic Course Outline. HMNS 207 Social Policy and Politics

CIS 253. Network Security

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ROLE OF THE PARALEGAL LEGL-101

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Shon Harris s Newly Updated CISSP Materials

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HITC 290 MEDICAL CODING INTERNSHIP

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002)

Network Security Course Specifications

The Next Generation of Security Leaders

COURSE SYLLABUS BMIS 342 CYBER SECURITY

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

MS Information Security (MSIS)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Computer Security and Investigations

CIS 156. Firewalls and Intrusion Detection

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE FAMILY LAW LEGL-124

Bellevue University Cybersecurity Programs & Courses

LINUX / INFORMATION SECURITY

Computer Network Engineering

JOHN A. LOGAN COLLEGE M. Rogers SM 14. CIS SECURITY AWARENESS 3 cr. (3-0)

JEFFERSON COLLEGE COURSE SYLLABUS MGT220 WEB MARKETING. 3 Credit Hours. Prepared by Vickie Morgan February 10, 2013

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Computer Security Literacy

Information Security Attack Tree Modeling for Enhancing Student Learning

Computer Network Engineering

CIS 241 INTRODUCTION TO E-COMMERCE

Security Transcends Technology

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS PROJECT SCHEDULING W/LAB ENGT 2021

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Introduction to Cyber Security / Information Security

Auto Technology Intro to Auto Tech Transmission 36 Weeks

CIS 270. Systems Analysis and Design

Georgia Perimeter College Faculty Senate New Course

INFORMATION TECHNOLOGY ENGINEER V

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. Introduction to Programming with Visual Basic.NET

COURSE PROFILE. IT482 Spring

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

Certification for Information System Security Professional (CISSP)

External Supplier Control Requirements

Auto Technology Intro to Auto Tech Basic Electricity 36 Weeks

Information Systems Security Certificate Program

Transcription:

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified Course: Modified C. Date of Revision: Spring 2012 D. Sponsoring Department: Computer Science E. Semester Credit Hours: 3 F. Weekly Contact Hours: 3 Lecture: 3 G. Corequisites: CISY-253 Advanced Computer Networking or CISY-258 Introduction to Network Design, Routing and Switching H. Laboratory Fees: No I. E-Mail Address of Department Chair: tedmunds@raritanval.edu II. Catalog Description Corequisite: CISY 253 Advanced Computer Networking or CISY 258 Introduction to Network Design, Routing and Switching. This course introduces the student to fundamental computer and network security concepts. These concepts are presented using the framework of the CISSP (Certified Information Systems Security Professional) ten domains of security which will help prepare the student for the CISSP certification examination. This course introduces students to the application of information security principles in supporting IT architectures, management and data protection. Students learn to design and implement security solutions which balance the demands of technology, processes, policies, budgets, and the workplace environment. III. Statement of Course Need A. Due to the widespread acceptance of both networking and Internet integration in most all business models and widespread personal use of high-speed internet

access and home networks, many computers are vulnerable to a wide range of malicious attacks. The widespread knowledge of this vulnerability, the low threshold of knowledge needed to exploit many of the vulnerabilities, and the funding and/or use of such attacks by many countries and special interest groups as information warfare, has created a need for comprehensive security measures to be administrated on all networks. This need is being recognized by many small to medium sized businesses that until now have not had security policies. The increase in companies of all sizes which now are engaged in web based information transfers, such as e-business, data mining, and product information distribution, has created a large market for security professionals. In addition to the financial risks that security breaches cause, new Federal and European Union laws requiring stringent privacy requirements have created legal risks for companies with poor data security. B. This course does not have a Lab component C. This course generally transfers as a Computer Science Elective IV. Place of Course in College Curriculum A. Free Elective B. This course meets a program requirement for: a. Computer Networking and Security, Certificate Traditional Emphasis b. Computer Networking A.A.S degree C. CIS Elective from the Computer Science (CISY) Electives List D. CISY Elective (200 level CISY course requirement for Information Systems & Technology, AAS) E. Course Transferability: for New Jersey schools go to the NJ Transfer website, www.njtransfer.org. For all other colleges and universities, go to their individual websites V. Outline of Course Content A. Introduction to Information Security and the 10 domain structure of the CISSP, and future directions in the field. B. Security Architecture & Models 1. Security Architecture & Models defined. 2. Modes of attack available at each level of the Security Architecture C. Telecommunications & Network Security 1. Network low level vulnerabilities & communication interception 2. Firewall software - levels at which it can monitor activity and deny access D. Access Control Methods 1. Methods of breaking access controls (hacking) CISY 229 2

2. Quality of workplace and privacy issues related to biometric and other personal information E. Application and Systems Development 1. The role of security throughout the Software Life Cycle Development Process 2. Security needs for Common application types 3. Application and systems vulnerabilities F. Operations Security 1. Security measures in System Administration (controls, protections, monitoring, and auditing) 2. Anti-virus software operation and functionality G. Cryptography Basics and Vulnerabilities H. Business Continuity Planning and Disaster Recovery Planning I. Law, Investigation, Ethics and Forensics J. Physical Security threats and vulnerabilities K. Security Management Practices 1. Security Policies and Information Classification 2. Roles, Responsibilities, and Risk Management VI. Educational Goals and Learning Outcomes A. General Educational Goals At the conclusion of the course, students will be able to: 1. Use the Internet for research, information analysis, problem solving, and decision making regarding information security and present their findings (GE-NJ 1, IL). 2. Recognize ethical and legal issues as they pertain to security measures, information handling, and other workplace events (GE-NJ ER) B. Student Learning Outcomes Upon completion of this course, students will be able to: 1. Explain the 10 domains of computer security 2. Evaluate the types of vulnerabilities a system may have and which level of networking may be affected by them 3. Design a corporate information security strategy addressing the major CISY 229 3

information security principles 4. Design and implement a Business Continuity and Disaster Recovery Plan 5. Research appropriate resources regarding legal and ethical issues, business needs, software upgrades, and vulnerabilities (Goal 2) 6. Research on relevant information security topics and present findings (Goal 1) VII. Modes of Teaching and Learning A. lecture/discussion (may be online) B. small-group work C. student oral presentations D. simulation/role playing VIII. Papers, Examinations, and other Assessment Instruments A. Weekly homework assignments B. Research papers C. Oral presentations D. Exams and quizzes E. Mid-term and final exams F. Classroom (or online forum) participation IX. Grade Determinants A. Essays B. Projects to include either Corporate Security Plan and/or Corporate Backup and Disaster Recovery Plan C. Exams D. Oral Presentations X. Texts and Materials Suggested Textbook Official (ISC) Guide to the CISSP CBK, Second Edition, Tipton, Harold, CRC Press, 2009 (Please Note: The course outline is intended only as a guide to course content and resources. Do not purchase textbooks based on this outline. The RVCC Bookstore is the sole resource for the most up-to-date information about textbooks.) XI. Resources A. standard library resources CISY 229 4

B. video projection equipment CISY 229 5