NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)



Similar documents
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Professional Issues

NEOSHO COUNTY COMMUNITY COLLEGE COURSE SYLLABUS. COURSE IDENTIFICATION Prefix Number: ACCT 205. Applied Science Division

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

* The official list of textbooks and materials for this course are found on Inside NC.

COURSE SYLLABUS COURSE IDENTIFICATION. Course Prefix/Number: BUSI 106

Introduction to Early Childhood Education. Course Syllabus

How To Pass A Health Information Technology Course At A Community College

COURSE SYLLABUS. TEXTS *The official list of textbooks and materials for this course are found on Inside NC.

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Administrative Aspects

Course Syllabus. COURSE IDENTIFICATION Course Prefix/Number: ALHT 230

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

MS Information Security (MSIS)

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CS 464/564 Networked Systems Security SYLLABUS

Syllabus. Required Textbooks: 1. Title: Hands-On Networking Fundamentals Author: Palmer Edition: 2nd Copyright Year: 2013 ISBN:

Network Security Course Specifications

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

CIS 213 PENETRATION TESTING 3 cr. (2-2)

CIS 4204 Ethical Hacking Fall, 2014

JOHN A. LOGAN COLLEGE M. Rogers SM 14. CIS SECURITY AWARENESS 3 cr. (3-0)

Frank Phillips College ITNW2305 Network Administration. Prerequisite and/or Co-requisite: BCIS1405 Advanced Microcomputer Applications

Syllabus Government 2306: Texas State and Local Government: 3 Credit Hours / 0 Lab Hours

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Course Title: ITAP 3471: Web Server Management

California University Online Distance elearning Simplified Student Handbook. CONTENTS I. Introduction Welcome Mission Statement

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

DUAL CREDIT PROGRAM ARTICULATION AGREEMENT

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

How To Pass A Credit Course At Florida State College At Jacksonville

Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later)

EXECUTIVE SUMMARY. List all of the program s learning outcomes: (regardless of whether or not they are being assessed this year)

Florida State College at Jacksonville MAC 1105: College Algebra Summer Term 2011 Reference: MW 12:00 PM 1:45 PM, South Campus Rm: G-314

Common Syllabus Revised

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.

CENTRAL TEXAS COLLEGE DEPARTMENT OF DRAFTING AND DESIGN SYLLABUS FOR DFTG 1417 ARCHITECTURAL DRAFTING-RESIDENTIAL

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Frank Phillips College. ITSY 2359: Security Assessment & Auditing

Forensic Biology 3318 Syllabus

CATALOG ADDENDUM Catalog

PSY 201 General Psychology Social & Behavioral Sciences Department

Texas State University. Sociology Department. Handbook. MA with a Major in Sociology. MS with a Major in Applied Sociology. 7 th Edition (2015)

RANGER COLLEGE SYLLABUS

GUIDE TO GRADUATE STUDIES DEPARTMENT OF SOCIOLOGY. Terminal (one-year) MA Program UNIVERSITY OF CINCINNATI

PH 7525 Introduction to Data & Statistical Packages Course Reference #: Spring 2011

Syllabus. No: CIS 207. Title: Intro to Computer Forensics. Credits: 3. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

ACCT 6232 Advanced Managerial Accounting Course Outline Spring 2015

FLORIDA INTERNATIONAL UNIVERSITY

Kennesaw State University KSU 2290: Transfer Student Seminar Section 02 Fall 2013

SOC 101 Introduction to Sociology Social & Behavioral Sciences Department

CREDIT FOR PRIOR LEARNING STUDENT HANDBOOK

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

MAT150 College Algebra Syllabus Spring 2015

EC-Council. Program Brochure. EC-Council. Page 1

DYERSBURG STATE COMMUNITY COLLEGE Course Syllabus

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

EDU 230 Schools in Communities Social & Behavioral Sciences Department

Curran, K. Tutorials. Independent study (including assessment) N/A

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Intermediate Algebra Math 0305 Course Syllabus: Spring 2013

ASU College of Education Course Syllabus ED 4972, ED 4973, ED 4974, ED 4975 or EDG 5660 Clinical Teaching

AHS 119 Health Careers Allied Health Sciences Department

In the College of Education at Stephen F. Austin State University, we value and are committed to:

Alabama Department of Postsecondary Education. Representing The Alabama Community College System

UVic Department of Electrical and Computer Engineering

RANGER COLLEGE Syllabus

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS PROJECT SCHEDULING W/LAB ENGT 2021

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Florida International University College of Nursing and Health Sciences Health Services Administration Policies and Procedures

El P ASO COMMUNITY COLLEGE El Paso, Texas

Online Course Development Templates Template 1 Learner-Centered Syllabus

Transcription:

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) x Health Care (HC) Lifetime Learning (LL) Nursing Developmental Credit Hour(s): Three (3) Effective Date: FA 2009/Fall 2013 Assessment Goal Per Outcome: 70% COURSE DESCRIPTION This course will provide an introduction to the many aspects of computer and data network security, and information assurance. The course will examine the rationale and necessity for securing computer systems and data networks, as well as methodologies for implementing security, security policies, best current practices, testing security, and incident response. Course concepts are reinforced by demonstrations and research assignments. MINIMUM REQUIREMENTS/PREREQUISITES AND/OR COREQUISITES CSIS 130 Introduction to Computer Information Systems or CSIS 100 Microcomputer Business Applications TEXTS The official list of textbooks and materials for this course is found on Inside NC. http://www.neosho.edu/prospectivestudents/registration/coursesyllabi.aspx

GENERAL EDUCATION OUTCOMES 1. Practice Responsible Citizenship through: identifying rights and responsibilities of citizenship, identifying how human values and perceptions affect and are affected by social diversity, identifying and interpreting artistic expression. 2. Live a healthy lifestyle (physical, intellectual, social) through: listing factors associated with a healthy lifestyle and lifetime fitness, identifying the importance of lifetime learning, demonstrating self-discipline, respect for others, and the ability to work collaboratively as a team. 3. Communicate effectively through: developing effective written communication skills, developing effective oral communication and listening skills. 4. Think analytically through: utilizing quantitative information in problem solving, utilizing the principles of systematic inquiry, utilizing various information resources including technology for research and data collection. COURSE OUTCOMES/COMPETENCIES (as Required) Upon completion of this course, students will be able to: Outcome 1: Identify the major components of computer and network security, and information assurance. o Learn importance of Installing Firewalls o Learn importance of Installing Proxy servers o Assess Vulnerability Outcome 2: Explain the importance of security policies and user awareness to the "secure" operation of a network and the positive impact on an organization. o Detect Intrusions o Take Appropriate Countermeasures Outcome 3: Describe the security vulnerabilities of common operating systems and data protocols, as well as countermeasures and other ways to mitigate the vulnerabilities. o Define Viruses o Define Spyware o Define Trojan horses Outcome 4: Articulate a security strategy for a given networking environment.

o Assess Vulnerability o Installed Firewalls o Installed Proxy servers Outcome 5: Identify ways in which to keep current on security events and notices. Monitor listservs Read white papers Webinars Outcome 6: Describe the ethical and legal considerations associated with "attacking" computer systems and networks. o Identify types of hackers o Define ethical hacking Outcome 7: Demonstrate the use of active directory in network security. Group policy management Users management Server management MINIMUM COURSE CONTENT The following topics must be included in this course. Additional topics may also be included. The main objective of this course is to provide the student with an understanding of the importance of security when implementing computers, servers, and networks. The course will cover a large set of topics, including: I. Principles of computer security - Passwords, biometrics, identification II. Basic cryptography and certificates III. Authentication IV. Secure network protocols (Kerberos, SSL) V. Program security A. Bug exploits

B. Malicious code: viruses, worms, Trojan horses, and more VI. Attacks and defenses on computer systems A. Firewalls B. Intrusion detection C. Proxy servers D. Vulnerability assessment E. Countermeasures VII. Operating system security (Windows XP/Vista) VIII. TCP/IP security IX. Virtual private networks X. Ethical and legal issues in computer security STUDENT REQUIREMENTS AND METHOD OF EVALUATION INSTRUCTIONAL METHODS. Explanation by the instructor of important concepts through online PowerPoints and handouts. 2. Class discussion of course material through Forums and Chats. 3. Using microcomputers to solve specific application problems. 4. Several forms of instructional media and class activities to show computer applications. STUDENT REQUIREMENTS The final grade in this course will be determined by homework assignments, lab exercises, major exams, and the final exam using the following percentages. Labs 40% Tests... 40% Final Exam... 20% GRADING SCALE 90-100% = A 80-89% = B 70-79% = C 60-69% = D 0-59% = F ASSESSMENT OF STUDENT GAIN The purpose of assessing student learning at Neosho County Community College is to ensure the educational purposes of the institution are met and appropriate changes are made in program development and classroom instruction to allow for student success. Pre-assessment ideally begins during the advisement and enrollment process prior to the beginning of the course where the advisor and student determine through the interview process the level of

placement for the student. During the period of the first two weeks of a normal semester, each student will be observed and/or interviewed and initial papers produced will be examined to determine needed competency development throughout the course. Post-assessment to determine gain in competency will be measured at the end of each unit of study. Attendance Policy 1. NCCC values interactive learning which promotes student engagement in the learning process. To be actively engaged, the student must be present in the learning environment. 2. Unless students are participating in a school activity or are excused by the instructor, they are expected to attend class. If a student s absences exceed one-eighth of the total course duration, (which equates to one hundred (100) minutes per credit hour in a face-to-face class) the instructor has the right, but is not required, to withdraw a student from the course. Once the student has been dropped for excessive absences, the registrar s office will send a letter to the student, stating that he or she has been dropped. A student may petition the chief academic officer for reinstatement by submitting a letter stating valid reasons for the absences within one week of the registrar s notification. If the student is reinstated into the class, the instructor and the registrar will be notified. Please refer to the Student Handbook/Academic Policies for more information 3. Absences that occur due to students participating in official college activities are excused except in those cases where outside bodies, such as the State Board of Nursing, have requirements for minimum class minutes for each student. Students who are excused will be given reasonable opportunity to make up any missed work or receive substitute assignments from the instructor and should not be penalized for the absence. Proper procedure should be followed in notifying faculty in advance of the student s planned participation in the event. Ultimately it is the student s responsibility to notify the instructor in advance of the planned absence. ACADEMIC INTEGRITY NCCC expects every student to demonstrate ethical behavior with regard to academic pursuits. Academic integrity in coursework is a specific requirement. Definitions, examples, and possible consequences for violations of Academic Integrity, as well as the appeals process, can be found in the College Catalog, Student Handbook, and/or Code of Student Conduct and Discipline. ELECTRONIC DEVICE POLICY Student cell phones and other personal electronic devices not being used for class activities must not be accessed during class times unless the instructor chooses to waive this policy. NOTE: Information and statements in this document are subject to change at the discretion of NCCC. Students will be notified of changes and where to find the most current approved documents.

NON-DISCRIMINATION POLICY The following link provides information related to the non-discrimination policy of NCCC, including persons with disabilities. Students are urged to review this policy. http://www.neosho.edu/departments/nondiscrimination.aspx COURSE NOTES