/ SYLLABUS FOR ITSY 1342
Information Technology Security
WeBB Learning
Semester Hours Credit: 3
Lecture Hours: 48
Course Dates:30 OCT – 24 DEC 2017
Weekly CTC Blackboard discussions and assignments
Instructor: Eric J. West
Instructor’s Location: Tacoma, WA
Skype Name: eric.west47
Weekly Skype Office Hours: Saturdays, 5-7PM AST
Instructor Email:
Phone: 1-253-222-6625
  1. INTRODUCTION
  1. Instruction in security for network hardware, software, and data, including physical security, backup procedures, relevant tools, encryption, and protection from viruses. This course also assists individuals in preparing for the Computing Technology Industry Association (CompTIA) Security+ certification exam and a career as a network professional.
  1. This course serves as a required or elective course on various degree plans. Curriculum plans for degrees and certificates are listed in the current Central Texas College catalog.
  1. The delivery method of this course may be traditional lecture/lab, blended lecture/lab, or online.
  1. Prerequisites: None.
  1. LEARNING OUTCOMES

Upon successful completion, Information Technology Security, the student will be able to:

  1. Identify and define National Institute of Standards and Technology (NIST) Guidelines and other best practices.
  2. Develop backup procedures to provide for data security.
  3. Use network operating system features to implement network security.
  4. Identify computer and network threats and vulnerabilities and methods to prevent their effects.
  5. Use tools to enhance network security.
  6. Use encryption techniques to protect network data.

III. INSTRUCTIONAL MATERIALS

A. The instructional materials identified for this course are viewable through

Required Student Textbook:

Ciampa,M.D. (2015). Security+ Guide to Network Security Fundamentals (5thed.). Boston, MA: Cengage.

ISBN: 978-1305093911

B. Lecture Classes also require at least one USB storage device. Online students may use cloud based storage.

IV. COURSE REQUIREMENTS:

Part 1:

  1. Attend both lecture and lab or in the case of online delivery, be actively engaged in Blackboard and maintain constant progress.
  1. Be prepared to participate in discussion, team projects/assignments and take unannounced assessments relating to the lecture materials.
  1. Complete all exams/assessments.
  1. Submit all assignments on time.

Part 2:

  1. Your first responsibility is scholarship. The grade you receive will not be the grade of your instructor, but rather the grade you and you alone make.
  1. You should attend all online Central Texas College (CTC) Blackboard sessions each week, along with any instructor-required live sessions on Skype, Blackboard Collaborate, Google+, FaceTime, etc. Be prepared to also take any unannounced quizzes relating to text assignments and lecture material presented from the beginning of the course. Please refer to ‘Class Attendance and Course Progress’ under the Academic Policies section in our current CTC Course Catalog.
  1. You are encouraged to give your best effort throughout the semester. From the beginning, you should plan for a steady, organized, and continuous effort, which in the long run will prove more effective for your final grade than a last minute crash-cram policy. Your course grade is not determined solely by exam grade. Such factors as class participation, initiative, attendance, and individual research papers will be considered in grade computation.
  1. From time to time, special library and/or outside assignments will be made to members of the class individually and/or in groups. You are expected to read all assignments and fulfill your responsibilities to any group assignment.
  1. You are expected to read all assigned material and bring your textbook to class. Keep informed on all assignments, especially after a period of absence.
  1. Good class notes are indispensable for earning a good grade since both the material assigned and discussed will be the basis for examination material.

G.Scholastic Honesty: All students are required and expected to maintain the highest standards of scholastic honesty in the preparation of all coursework and during examinations. The following are considered examples of scholastic dishonesty:

Plagiarism: The taking of passages from the writing of others without giving proper credit to the sources.

Collusion: Using another’s work as one’s own, or working together with another person in the preparation of work, unless such joint preparation is specifically approved in advance by the instructor.

Cheating: Giving or receiving information on examinations.

Students guilty of scholastic dishonesty will be administratively dropped from the course with a grade of “F” and be subject to disciplinary action, which may include suspension and expulsion

  1. Special Work: A term paper or other project, per requirements of the instructor, will be required. The subject must be appropriate for the course material. Check with the instructor when you have made a selection. The value is indicated in the semester grade computation and has considerable weight on your final average.

V. COURSE FORMAT – WeBB Learning on BLACKBOARD

This course has been developed on Blackboard. It is the student’s responsibility to make sure that they have access to CTC Blackboard and that they are familiar with the contents and assignments. It is also the student’s responsibility to log into CTC Blackboard at least once a week to ‘attend’ the online class portion and to participate in the online Blackboard streaming sessions, discussions, and assignments. Failure to do so will violate the attendance policy and will have a negative impact on the course grade.

The course will meet for EIGHT (8) weeks. Instructional strategies will include weekly CTC Blackboard assignments, discussion boards, and streaming sessions to accomplish the lecture hours per week. Weekly interactions will be available via various communication tools to include Skype, Blackboard Collaborate, or Voice Podcaster/Voice Email, and conventional use of emails and Blackboard Message Board. Students may be assigned to participate in Groups, Journals, Blogs, or Wikis. Students will also have an access to required Discussion Board threads; course Announcements; critiques and feedback on Assignments and drafts of papers. Specific weekly interaction will be communicated via Announcements on Blackboard and arranged with the course instructors.

VI. EXAMINATIONS

  1. Student content mastery will be evaluated in the following areas:

•Assessments (midterm exam, quizzes, projects, discussionetc.)

•Final Assessment (final exam and/or semester project, participation)

B.A student must complete all scheduled examinations. Students who know in advance that they will be unavailable for an examination due to valid reasons must arrange to take an early examination. Unexpected absences due to illness or extenuating circumstances will require the student to see the instructor about individual make-up work.

C.Students without excused absences will be given a zero for the missed proctored examinations.

D.Examinations will consist of both objective (true/false, multiple choice, fill in-the-blank, and matching) and subjective (short answer and essay) questions. Students must be able to communicate both orally and in written form, thus some questions requiring the composition and writing of an essay answer will be required.

E.Exams will be administered via BioSig application.See Blackboard class for registration information.

VII. SEMESTER GRADE COMPUTATIONS

The final grade in this course will be based on the following:

Course Requirements / Points
Assignments / 300
Assessments / 300
Final Assessment / 400
TOTAL / 1000
Points / Grade / Quality
Points
900-1000 / A-Superior / 4
800-899 / B-Above Average / 3
700-799 / C-Average / 2
600 - 699 / D – Passing but / 1
Unsatisfactory
0 -599 / F-Failure / 0

VIII. NOTES AND ADDITIONAL INSTRUCTIONS FROM COURSE INSTRUCTOR

  1. Tuition refunds are made only in the case of class cancellation or official and timely withdrawal from CTC or from a course. Please refer to the current course catalog for more details.
  2. GoArmyEdstudents should contact their education counselor before withdrawing and are required to withdraw through the GoArmyEd portal.

Please note: a military withdrawal does not override CTC’s grading policy.

For self-pay students, refunds are computed from the date the Application for

Withdrawal or Refund is filed with the CTC Field Representative or designated student Services Officer. Special conditions apply to students who receive federal, state, and/or institutional financial aid.

Tuition and fees paid directly to the Institution by the Veterans Administration, Title IV (Financial Aid Programs, a sponsor, donor, or scholarship shall be refunded to the source rather than directly to the students.

  1. Course Withdrawals, Student Responsibilities: It is the student’s responsibility to officially withdraw from a course. The instructor cannot initiate a withdrawal based upon a student’s request. Rather, students must initiate the withdrawal with the designated Education Center Representative, through the CTC Field Representative or the Student Services Officer for that region.

Applications for Withdrawal will be accepted at any time before the completion of 75% of the course, after which time the student will be assigned an “FN”- “Failure for Non-attendance.”

  1. Faculty/Administrative Initiated Withdrawals

Faculty are authorized to withdraw students who are not making satisfactory course progress as outlined in the section of the Catalog entitled "Satisfactory Progress Standards”.

A student may be administratively withdrawn by a designated member of the administrative staff of the College under the following conditions:

  • The student has been placed on Academic Suspension or Disciplinary Suspension;
  • The student has an outstanding financial obligation owed to the college;
  • The student registered for a course without the required prerequisite or departmental permission;
  • Students who do not participate or complete graded activities during the first week will be administratively withdrawn.

The college is under no obligation to refund tuition and fees, or other costs associated with a student who is administratively withdrawn.

  1. Incomplete / Course in Progress Grade Policy: An “IP” or “Incomplete” grade may be assigned by an instructor if a student has made satisfactory progress in a course with the exception of a major quiz, final exam, or other project. The “IP” grade may also be assigned based on circumstances beyond a student’s control, such as personal illness, death in the immediate family, or military orders. Notice of absences, with supporting documentation, may be required by the instructor. The instructor makes the final decision concerning the granting of the incomplete grade. With an “Incomplete” grade, students are required to complete a set amount of work before the instructor will submit an official letter grade.
  2. Cellular phones, beepers, and other electronic devices will be turned off while the student is in the classroom or laboratory unless the student is using the device for class purposes. No texting or social networking is allowed during class.
  3. Instructor Discretion: The instructor reserves the right of final decision in course requirements.
  4. Civility: Individuals are expected to be cognizant of what a constructive educational experience is and respectful of those participating in a learning environment. Failure to do so can result in disciplinary action up to and including expulsion.

IX. COURSE OUTLINE

Note:

The instructor has the right to change the course schedule and will announce any changes in class.

This structured course has been developed on Blackboard with any instructor-required live sessions on Skype, Blackboard Collaborate, Google+, FaceTime, etc. It is not a self-paced course. Please follow your instructor’s schedule of Discussion Board posts, lessons, assignments, and quizzes/exams.

The course will meet for EIGHT (8) weeks. Instructional strategies will include weekly CTC Blackboard assignments and discussion boards to accomplish the learning outcomes.

Schedule of Assignments:

Weekly:

a)CTC Blackboard Discussion Board posts are due by Thursday at midnight, AST

1. CTC Blackboard peer responses to Discussion Board posts is due by Saturday midnight, AST

b)CTC Blackboard assignment/project is due Saturday midnight, AST

Lesson/Session / Chapters / Lessons / Assignments / Due Dates
NLT
1 / INTRODUCTION and
First Half of Part I
Chapter 1 & 2 / 1. Lesson 1 Assignments
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 1 Discussion Board Topic
3. Lesson 2 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
4. Lesson 2 Discussion Board Topic / 11/5
2 / Second half of PART I
Chapter 3 / 3. Lesson 3 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
4. Lesson 3 Discussion Board
FIRST BLACKBOARD COLLABORATE – 11/11
First Assessment due / 11/12
3 / PART II
Chapter 4 / 1. Lesson 4 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 4 Discussion Board Topic / 11/19
4 / PART III
Chapters 5-6 / 1. Lesson 5 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 5 Discussion Board 1. Lesson 6 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
3. Lesson 6 Discussion Board Topic / 11/26
5 / PART IV
Chapters 7-8 / 1. Lesson 7 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 7 Discussion Board Topic
3. Lesson 8 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
4. Lesson 8 Discussion Board
SECOND BLACKBOARD COLLABORATE – 12/2
Mid-Term Assessment Due / 12/3
6 / PART V
Chapters 9-10 / 1. Lesson 9 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 9 Discussion Board Topic
3. Lesson 10 Assignment
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
4. Lesson 10 Discussion Board / 12/10
7 / PART VI
Chapter 11-12 / 1. Lesson 11 Assignments
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 11 Discussion Board Topic
3. Lesson 12 Assignments
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
4. Lesson 12 Discussion Board Topic
LAST BLACKBOARD COLLABORATE – 12/16
Review for Final Exam
Complete final project / 12/17
8 / PART VII
Chapter 13, 14, 15 / 1. Lesson 13 Assignments
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
2. Lesson 13 Discussion Board Topic
3. Lesson 14 Assignments
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
4. Lesson 14 Discussion Board Topic
5. Lesson 15 Assignments
a. Complete Chapter PC labs/Case Studies
b. Submit assigned papers and/or projects
6. Lesson 15 Discussion Board Topic
COMPLETE FINAL ASSESSMENT / 12/24

VIII. COURSE OUTLINE

  1. Lesson One:
  1. Learning Outcomes: Upon successful completion of this lesson the student will be able to:
  2. Describe the challenges of securing information
  3. Define information security and explain why it is important
  4. Identify the types of attackers that are common today
  5. List the basic steps of an attack
  6. Describe the five basic principles of defense
  7. Define malware
  8. List the types of malware
  9. Identify payloads of malware
  10. Describe the types of social engineering psychological attacks
  11. Explain physical social engineering attacks
  1. Learning Activities:
  2. Participate in collaborative discussions based on the assigned reading materials.
  3. Complete assigned PC Labs and Case Studies
  4. Submit assigned papers and/or projects
  1. Unit Outline:
  2. Introduction
  3. Introduction to Network Security
  4. Malware and Social Engineering Attacks
  1. Lesson Two:
  1. Learning Outcomes: Upon successful completion of this lesson the student will be able to:
  2. List and explain the different types of server-side web application attacks
  3. Define client-side attacks
  4. Explain how overflow attack works
  5. List different types of networking-based attacks
  6. List the steps for securing a host computer
  7. Define application security
  8. Explain how to secure data
  1. Learning Activities:
  2. Participate in collaborative discussions based on the assigned reading materials.
  3. Complete assigned PC Labs and Case Studies

1Submit assigned papers and/or projects

Unit Outline:

  1. Application and Network Attacks
  2. Vulnerability Assessment and Mitigating Attacks
  1. Lesson Three:
  1. Learning Outcomes: Upon successful completion of this lesson the student will be able to:
  2. Define cryptography
  3. Define harsh, symmetric, and asymmetric cryptographic algorithms
  4. List the various ways in which cryptography is used
  5. Define digital certificates
  6. List the various types of digital certificates and how they are used
  7. Describe the components of Public Key Infrastructure (PK)
  8. List the tasks associated with key management
  9. Describe the different transport encryption protocols
  1. Learning Activities:
  2. Participate in collaborative discussions based on the assigned reading materials.
  3. Complete assigned PC Labs and Case Studies
  4. Submit assigned papers and/or projects
  1. Unit Outline:
  2. Basic Cryptography
  3. Advanced Cryptography
  1. Lesson Four:
  1. Learning Outcomes: Upon successful completion of this lesson the student will be able to:
  2. List the different types of network security devices and how they can be used
  3. Explain how network technologies can enhance security
  4. Describe secure network design elements
  5. List and describe the functions of common network protocols
  6. Explain how network administration principles can be applied
  7. Define different network applications and how they can be secured
  1. Learning Activities:
  2. Participate in collaborative discussions based on the assigned reading materials.
  3. Complete assigned PC Labs and Case Studies
  4. Submit assigned papers and/or projects
  1. Unit Outline:
  2. Network Security Fundamentals
  3. Administering a Secure Network
  1. Lesson Five:
  1. Learning Outcomes: Upon successful completion of this lesson the student will be able to:
  2. Describe the different types of wireless network attacks
  3. List the vulnerabilities in IEEE 802.11 security
  4. Explain the solutions for securing a wireless network
  5. List and compare the different types of mobile devices
  6. Explain the risks associated with mobile devices
  7. List ways to secure a mobile device
  8. Explain how to apply mobile device app security
  9. Describe how to implement BYOD security
  1. Learning Activities:
  2. Participate in collaborative discussions based on the assigned reading materials.
  3. Complete assigned PC Labs and Case Studies
  4. Submit assigned papers and/or projects
  5. Unit Outline:
  6. Wireless Network Security
  7. Mobile Device Security
  1. Lesson Six:
  1. Learning Outcomes: Upon successful completion of this lesson the student will be able to:
  2. Define access control and list the four access control models
  3. Describe how to implement access control
  4. Explain the different types of authentication services
  5. Describe the different types of authentication credentials
  6. Explain what single sign-on can do
  7. List the account management procedures for securing passwords
  1. Learning Activities:
  1. Participate in collaborative discussions based on the assigned reading materials.
  2. Complete assigned PC Labs and Case Studies
  3. Submit assigned papers and/or projects

Unit Outline: