Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management



Similar documents
Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Syllabus: AIT 673 (Online) - Cyber Incident Handling/Response

PREREQUISITES Completion or concurrent enrollment in all other required general education courses, GOVT 300, and 18 credits in the major.

4ECE 320 Signals and Systems II Department of Electrical and Computer Engineering George Mason University Fall, 2015

PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus

CS4320 Computer and Network Security. Fall 2015 Syllabus

Common Syllabus Revised

George Mason University Electrical and Computer Engineering Department ECE 201: Introduction to Signal Analysis Syllabus Fall 2015

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Fall Syllabus. College of Health and Human Services. HAP 700: Introduction to Health Informatics. Course information

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

ITS425: Ethical Hacking and Penetration Testing

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

HAP 750 Legal Issues in Health Administration Summer 2014

Critical Controls for Cyber Security.

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

IT 342 Operating Systems Fundamentals Fall 2014 Syllabus

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

COURSE TEXTBOOK [Insert required course text academic format for book listing with ISBN# and edition]

IT 101 Introduction to Information Technology

TCOM 562 Network Security Fundamentals

MIS 7381 Syllabus_Spring 2016_Cooper.doc 1 02/08/16 2:44 PM

ITS425: Ethical Hacking and Penetration Testing

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

COURSE SYLLABUS BMIS 342 CYBER SECURITY

Psychological Testing (PSYCH 149) Syllabus

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Computer Information Security. Course Syllabus

Psychology 2510: Survey of Abnormal Psychology (Section 2) Fall 2015

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

WAYLAND BAPTIST UNIVERSITY VIRTUAL CAMPUS SCHOOL OF BUSINESS SYLLABUS

Collin College Business and Computer Systems

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

POFT 1309 Administrative Office Procedures I COURSE SYLLABUS

WAYLAND BAPTIST UNIVERSITY ONLINE CAMPUS SCHOOL OF BUSINESS SYLLABUS

Course Syllabus Revised: Dec. 20, 2011.

COURSE SYLLABUS MAC1105 College Algebra

DSCI 3710 Syllabus: Spring 2015

Windows Server 2008 Active Directory Configuration (ITMT 2302)

St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus

CS 464/564 Networked Systems Security SYLLABUS

CIT 217 Security + Network Security Fall 2015

Information Security and Risk Management

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

TOUR 412 Tourism and Events Marketing Spring 2016

Course Description: Examines the basic elements of marketing theory, terminology and concepts with emphasis placed on analyzing consumer motivation.

HAWAII CAMPUS SCHOOL OF BUSINESS SYLLABUS

Looking at the SANS 20 Critical Security Controls

ERP 5210 Performance Dashboards, Scorecard, and Data Visualization Course Syllabus Spring 2015

Applied Network Security Course Syllabus Spring 2015

Course Catalog. Description: Instructor: Prerequisites: Co-requisites: Textbook and Other Course Materials:

CS135 Computer Science I Spring 2015

Johns Hopkins University School of Nursing

CS 450/650 Fundamentals of Integrated Computer Security

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York

Course Title: ITAP 3471: Web Server Management

SYST 371 SYSTEMS ENGINEERING MANAGEMENT

ISM527 - Cyber Security Management

CYBER SECURITY TRAINING SAFE AND SECURE

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Alvin Community College Human Resource Management, HRPO Student Information Plan (SIP) - Distance Learning Spring, 2014

IT 415 Information Visualization Spring Semester

BERGEN COMMUNITY COLLEGE DIVISION OF ARTS AND HUMANITIES. COURSE SYLLABUS- Speech Communication COM- 100

UVic Department of Electrical and Computer Engineering

Introduction to Personality Psychology 2320, Spring 2013 TTh 5:30-6:45 Arts and Science 110 (Allen Auditorium)

Advanced Digital Forensics ITP 475 (4 Units)

COURSE SYLLABUS. Instructor Background: M.S. Computer Information Systems, Nova Southeastern University

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Borough of Manhattan Community College Department of Social Science. POL American Government Spring 2014

George Mason University Graduate School of Education Special Education Program

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona

CISM Fundamentals of Computer Applications

CMJ CRIME SCENE INVESTIGATION Spring Syllabus 2015

Instructor: M. Susan Burns Office: Thompson 1252 Telephone: address: Office hours: By appointment

Transcription:

Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2013 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering E-mail: jholcom9@gmu.edu Course: AIT 671 -- Information System Infrastructure Credits: 3 Examines information system infrastructure lifecycle management including the audit process, IT governance and best practices, system and infrastructure control, IT service delivery and support, protection of information assets, physical security, business and disaster recovery. Day/Time: Thursday 4:30 pm-7:10 pm Where: West Building Room 1008 Textbooks (Reference): None Other Resources (Reference): Paper readings and internet resources posted on Blackboard -- AIT 671 Course Optional Resources (Recommended): 1. Richard Bejtlich, The Practice of Network Security Monitoring: Understanding Incident Detection and Response, No Starch Press (August 2, 2013). ISBN: 978-1593275099 2. Patrick Engebretson, The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy, Syngress; 2 edition (August 15, 2013) ISBN: 978-0124116443 Course Goals: 1. Obtain in-depth knowledge on various security systems examples. 2. Gain increased understanding of attack models used against security systems. 3. Learn how security systems provide defenses and counter measures against differing attack vectors. 4. Understand overall evaluation and management of security systems life cycle. Page 1 of 5 Fall 2013

Grading policy: Grades will be determined based on the following: Grade Component Weight Current Cyber Event Paper #1 10% Current Cyber Event Paper #2 10% Quiz 10% Lab assignments 20% Team Project and Presentation 40% Class Participation 10% Total: 100% The grading scale for this course is: Numeric Grade Letter Grade 97 100% A+ 93 96% A 90 92% A 87 89% B+ 83 86% B 80 82% B- 77 79% C+ 73 76% C 70 72% C- 60 69% D 0 59% F Page 2 of 5 Fall 2013

Current Cyber Event Papers (2): Select a recent cyber event - research the event using open source references - write an executive-level technical brief on the event. Include the following at a minimum: threat vector used, vulnerability attacked, business impact of this event, your recommended security system(s) to help provide increased defenses against similar attacks in the future, and why/justification. The length of this paper should be one page - maximum of two pages. (One page is a single side of paper) On a separate page include your open source references - minimum of two (2) unique sources are required. Quiz: A 25 question open-book multiple choice quiz covering the key terms/topics discussed during the first seven (7) weeks of the course. Lab Assignments: Tentative plan -- at least two (2) labs supporting security systems and actions/features. Team Project and Presentation: (Five teams of 5-6 people) Either a Red team (Penetration testing team) or Security audit consultants (your team will decide) You will be auditing security systems/security controls currently in place and recommending improvements. Select a fictitious critical infrastructure sector company and create a senior executive (CISO/CIO) level report, with accompanying executive briefing, highlighting the "results" of your red team test or security audit. At a minimum cover what may happen to the company if they do not implement your top four (4) recommendations and are hit with malicious software, or a breach, describing the potential security risk in great detail. Include how your team approached/engaged with the company, standard processes you used, tools (software/hardware), social, and/or physical security testing that you used, time period of the testing, potential business impacts of any major issues you identified, cost of the assessment, team skills with estimated costs, and the [critical] reporting process. The length of the report should be less than 15 pages. (One page is a single side of paper) On a separate attachment include your open source references. The report and presentation will be given during our final two sessions. Class Participation: Active participation in weekly lectures, labs, and team assignments. Page 3 of 5 Fall 2013

Lecture Schedule (Tentative): Week 1: Introduction to Information Systems Infrastructure Life Cycle Management and Best Practices Week 2: Security Systems Overview (Firewall, IDS/IPS, Monitoring Systems, SIEM, etc.) and Threat Vectors Overview Week 3: User s Awareness/Training/Vulnerability and Configuration Management Lab Preparation Week 4: Defense Methods and Examples Introduction Lab #1 (Current Cyber Event Paper # 1 due) Week 5:.Lab #1 Week 6: Malware against Security Systems (Software Vulnerability Attacks and Analysis) Week 7: Attack Models against Security Systems Introduction Lab #2 (Current Cyber Event Paper # 2 due) Week 8: Lab #2 (Quiz opens) Week 9: Defense Methods against various software vulnerability attacks (Quiz closes) Week 10: Physical Security and Business/Disaster Recovery Week 11: Evaluation Methods of Security Systems and Metrics on Measuring Security Enhancements Week 12: (Tentative) Lab #3 Week 13: Team Reports and Presentations Week 14: Team Reports and Presentations Page 4 of 5 Fall 2013

Honor Code: All work performed in this course will be subject to the GMU s Honor Code. Any violation will be reported to the honor committee. Academic Integrity: GMU is an Honor Code university; please see the Office for Academic Integrity for a full description of the code and the honor committee process. The principle of academic integrity is taken very seriously and violations are treated gravely. What does academic integrity mean in this course? Essentially this: when you are responsible for a task, you will perform that task. When you rely on someone else s work in an aspect of the performance of that task, you will give full credit in the proper, accepted form. Another aspect of academic integrity is the free play of ideas. Vigorous discussion and debate are encouraged in this course, with the firm expectation that all aspects of the class will be conducted with civility and respect for differing ideas, perspectives, and traditions. When in doubt (of any kind) please ask for guidance and clarification. Office of Disability Services: If you are a student with a disability and you need academic accommodations, please see me and contact the Office for Disability Services (ODS) at 993-2474, http://ods.gmu.edu. All academic accommodations must be arranged through the ODS. Mason e-mail Accounts: Students must use their MasonLIVE email account to receive important University information, including messages related to this class. See http://masonlive.gmu.edu for more information. Other Useful Campus Resources: Writing Center: A114 Robinson Hall; (703) 993-1200; http://writingcenter.gmu.edu University Libraries Ask a Librarian : http://library.gmu.edu/mudge/im/imref.html Counseling And Psychological Services (CAPS): (703) 993-2380; http://caps.gmu.edu University Policies: The University Catalog, http://catalog.gmu.edu, is the central resource for university policies affecting student, faculty, and staff conduct in university academic affairs. Other policies are available at http://universitypolicy.gmu.edu/. All members of the university community are responsible for knowing and following established policies. Page 5 of 5 Fall 2013