SAMPLE. ISM530: Enterprise Cybersecurity. Course Description and Outcomes. Participation & Attendance

Similar documents
SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

SAMPLE. ORG423: Communication Strategies for Leaders

Texas A&M University - Central Texas PSYK EDUCATIONAL PSYCHOLOGY INSTRUCTOR AND CONTACT INFORMATION

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

INTRODUCTION TO GENERAL PSYCHOLOGY (PSYC 1101) ONLINE SYLLABUS. Instructor: April Babb Crisp, M.S., LPC

MBA 5652, Research Methods Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

BIODIVERSITY: CAUSES, CONSEQUENCES, AND CONSERVATION

MGMT 479 (Hybrid) Strategic Management

University of Massachusetts Lowell Graduate School of Education Program Evaluation Spring Online

BSM 2801, Sport Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

SYLLABUS: RURAL SOCIOLOGY 1500 INTRODUCTION TO RURAL SOCIOLOGY SPRING 2017

POFI 1301 IN, Computer Applications I (Introductory Office 2010) STUDENT INFORMANTION PLAN Spring 2013

Texas A&M University - Central Texas PSYK PRINCIPLES OF RESEARCH FOR THE BEHAVIORAL SCIENCES. Professor: Elizabeth K.

MBA6941, Managing Project Teams Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

BUS 4040, Communication Skills for Leaders Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. Academic Integrity

The Entrepreneurial Mindset Syllabus

Medical Terminology - Mdca 1313 Course Syllabus: Summer 2017

BHA 4053, Financial Management in Health Care Organizations Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

IST 440, Section 004: Technology Integration and Problem-Solving Spring 2017 Mon, Wed, & Fri 12:20-1:10pm Room IST 202

School: Business Course Number: ACCT603 General Accounting and Business Concepts Credit Hours: 3 hours Length of Course: 8 weeks Prerequisite: None

Adler Graduate School

STA2023 Introduction to Statistics (Hybrid) Spring 2013

Course Syllabus It is the responsibility of each student to carefully review the course syllabus. The content is subject to revision with notice.

PSY 1010, General Psychology Course Syllabus. Course Description. Course etextbook. Course Learning Outcomes. Credits.

Office Location: LOCATION: BS 217 COURSE REFERENCE NUMBER: 93000

Dowling, P. J., Festing, M., & Engle, A. (2013). International human resource management (6th ed.). Boston, MA: Cengage Learning.

CRITICAL THINKING AND WRITING: ENG 200H-D01 - Spring 2017 TR 10:45-12:15 p.m., HH 205

Cleveland State University Introduction to University Life Course Syllabus Fall ASC 101 Section:

Maintaining Resilience in Teaching: Navigating Common Core and More Online Participant Syllabus

SAMPLE. MGT451: Business Policy Development and Implementation

Shank, Matthew D. (2009). Sports marketing: A strategic perspective (4th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

EDIT 576 (2 credits) Mobile Learning and Applications Fall Semester 2015 August 31 October 18, 2015 Fully Online Course

COURSE INFORMATION. Course Number SER 216. Course Title Software Enterprise II: Testing and Quality. Credits 3. Prerequisites SER 215

COURSE SYLLABUS: CPSC6142 SYSTEM SIMULATION-SPRING 2015

Scottsdale Community College Spring 2016 CIS190 Intro to LANs CIS105 or permission of Instructor

Automating Outcome Based Assessment

Academic Integrity RN to BSN Option Student Tutorial

ECON492 Senior Capstone Seminar: Cost-Benefit and Local Economic Policy Analysis Fall 2017 Instructor: Dr. Anita Alves Pena

Spring 2015 CRN: Department: English CONTACT INFORMATION: REQUIRED TEXT:

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online

COMS 622 Course Syllabus. Note:

EDIT 576 DL1 (2 credits) Mobile Learning and Applications Fall Semester 2014 August 25 October 12, 2014 Fully Online Course

CS 100: Principles of Computing

Social Media Journalism J336F Unique Spring 2016

Texas A&M University-Kingsville Department of Language and Literature Summer 2017: English 1302: Rhetoric & Composition I, 3 Credit Hours

POFI 1349 Spreadsheets ONLINE COURSE SYLLABUS

LMIS430: Administration of the School Library Media Center

Syllabus - ESET 369 Embedded Systems Software, Fall 2016

Texas A&M University-Central Texas CISK Comprehensive Networking C_SK Computer Networks Monday/Wednesday 5.

HARRISBURG AREA COMMUNITY COLLEGE ONLINE COURSE SYLLABUS

Program Guidebook. Endorsement Preparation Program, Educational Leadership

Business Computer Applications CGS 1100 Course Syllabus. Course Title: Course / Prefix Number CGS Business Computer Applications

SYLLABUS. EC 322 Intermediate Macroeconomics Fall 2012

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

The University of Texas at Tyler College of Business and Technology Department of Management and Marketing SPRING 2015

CENTRAL MICHIGAN UNIVERSITY COLLEGE OF EDUCATION AND HUMAN SERVICES

Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social psychology (7th ed.). Upper Saddle River, NJ: Prentice Hall.

Demography and Population Geography with GISc GEH 320/GEP 620 (H81) / PHE 718 / EES80500 Syllabus

IPHY 3410 Section 1 - Introduction to Human Anatomy Lecture Syllabus (Spring, 2017)

Monday/Wednesday, 9:00 AM 10:30 AM

General Physics I Class Syllabus

PSY 1012 General Psychology. Course Policies and Syllabus

Clatsop Community College

COMMUNICATIONS FOR THIS ONLINE COURSE:

Foothill College Summer 2016

THESIS GUIDE FORMAL INSTRUCTION GUIDE FOR MASTER S THESIS WRITING SCHOOL OF BUSINESS

Human Development: Life Span Spring 2017 Syllabus Psych 220 (Section 002) M/W 4:00-6:30PM, 120 MARB

Marketing Management MBA 706 Mondays 2:00-4:50

Valcik, N. A., & Tracy, P. E. (2013). Case studies in disaster response and emergency management. Boca Raton, FL: CRC Press.

MMC 6949 Professional Internship Summer 2017 X7135, X72BH, X722A University of Florida, Online Master of Arts in Mass Communication 3 Credit Hours

MGMT 3362 Human Resource Management Course Syllabus Spring 2016 (Interactive Video) Business Administration 222D (Edinburg Campus)

CEEF 6306 Lifespan Development New Orleans Baptist Theological Seminary

Sul Ross State University Spring Syllabus for ED 6315 Design and Implementation of Curriculum

CIS 121 INTRODUCTION TO COMPUTER INFORMATION SYSTEMS - SYLLABUS

English Policy Statement and Syllabus Fall 2017 MW 10:00 12:00 TT 12:15 1:00 F 9:00 11:00

FINN FINANCIAL MANAGEMENT Spring 2014

Photography: Photojournalism and Digital Media Jim Lang/B , extension 3069 Course Descriptions

SECTION 12 E-Learning (CBT) Delivery Module

Corporate Communication

ICT/IS 200: INFORMATION LITERACY & CRITICAL THINKING Online Spring 2017

Introduction to Information System

HIST 3300 HISTORIOGRAPHY & METHODS Kristine Wirts

CENTRAL MICHIGAN UNIVERSITY COLLEGE OF EDUCATION AND HUMAN SERVICES Department of Teacher Education and Professional Development

COMMUNICATION AND JOURNALISM Introduction to Communication Spring 2010

INFO I303 Organizational Informatics

ACADEMIC POLICIES AND PROCEDURES

BSW Student Performance Review Process

RETURNING TEACHER REQUIRED TRAINING MODULE YE TRANSCRIPT

MMC 6949 Professional Internship Fall 2016 University of Florida, Online Master of Arts in Mass Communication 3 Credit Hours

Course Policies and Syllabus BUL3130 The Legal, Ethical, and Social Aspects of Business Syllabus Spring A 2017 ONLINE

Lyman, M. D. (2011). Criminal investigation: The art and the science (6th ed.). Upper Saddle River, NJ: Prentice Hall.

Content Teaching Methods: Social Studies. Dr. Melinda Butler

Houghton Mifflin Online Assessment System Walkthrough Guide

Course Syllabus MFG Modern Manufacturing Techniques I Spring 2017

Welcome to WRT 104 Writing to Inform and Explain Tues 11:00 12:15 and ONLINE Swan 305

IDS 240 Interdisciplinary Research Methods

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

BOS 3001, Fundamentals of Occupational Safety and Health Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

Transcription:

ISM530: Enterprise Cybersecurity Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 14-20 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research. Course Description and Outcomes Course Description: This course provides students with insight into the cybersecurity issues surrounding an enterprise. These include securing organizational data, responding to cyber- based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information. The course reviews the network security and cryptographic techniques that are currently being used. The nuances involved in defining cybersecurity strategies and complying with security standards to ensure governance are also discussed. Course Learning Outcomes: 1. Analyze possible threats to organizational data and recommend course(s) of action to mitigate cybercrime attacks. 2. Evaluate different authentication methodologies to provide solutions to secure information assets. 3. Explain how authentication is used with cryptography to secure information access. 4. Demonstrate the ability to recognize and communicate threats to organizational information assets. 5. Analyze and evaluate the commitment of foreign governments for the expansion of nationally owned telecommunications services for the support of business and government technologies. Participation & Attendance Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor. Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible.

Course Materials Textbook Information is located in the CSU-Global Booklist on the Student Portal. Course Schedule Due Dates The Academic Week at CSU-Global begins on Monday and ends the following Sunday. Discussion Boards: The original post must be completed by Thursday at 11:59 p.m. MT and Peer Responses posted by Sunday 11:59 p.m. MT. Late posts may not be awarded points. Critical Thinking Assignments & Labs: Assignments are due Sunday at 11:59 p.m. MT. Week # Readings Assignments 1 2 3 4 5 6 7 8 Chapter 1 in Principles of Information Security Discussion (25 points) Lab (40 points) Chapters 2 & 3 in Principles of Information Security Discussion (25 points) Critical Thinking Assignment (55 points) Portfolio Project Milestone (25 points) Lab (20 points) Chapter 4 in Principles of Information Security Discussion (25 points) Critical Thinking Assignment (55 points) Lab (20 points) Chapter 5 in Principles of Information Security Discussion (25 points) Critical Thinking Assignment (60 points) Portfolio Project Milestone (25 points) Lab (20 points) Chapters 6 & 7 in Principles of Information Security Discussion (25 points) Critical Thinking Assignment (60 points) Lab (40 points) Chapters 8 & 9 in Principles of Information Security Discussion (25 points) Critical Thinking Assignment (60 points) Lab (20 points) Chapters 10 & 11 in Principles of Information Security Discussion (25 points) Chapter 12 in Principles of Information Security Discussion (25 points) Portfolio Project (300 points)

Assignment Details This course includes the following assignments/projects: Module 1 LAB (40 points) Part 1 (Lab #1): Configure an Active Directory Domain Controller The first part of this lab assignment (Lab #1) provides a hands-on opportunity to configure an Active Directory domain controller. Active Directory is at the heart of Windows Server security and provides a mechanism to establish a variety of other security measures within a Windows-based network. Follow the steps below to complete this portion of the assignment: 1. Read through the Student Lab Guide carefully. It provides detailed instructions for accessing and completing the labs in this course. 2. Open the Lab 1 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 3. Click the Lab Access link below to enter the virtual lab environment. 4. Read through all of the material under the Intro and Steps tabs before you start working. 5. Follow the step-by-step instructions under the Steps tab to perform the lab. Note: You will not be completing a lab report, so you can disregard instructions on how to make screen captures. 6. After completing the hands-on lab, complete and submit the Lab 1 Assessment Worksheet. (Use the Part 2 (Lab #2): Manage Windows Accounts and Organizational Units In Part 2 of this lab (Lab #2), you will use the Microsoft Active Directory Users and Computers utility to create and manage Windows accounts. Follow the steps below to complete this portion of the assignment: 1. Open the Lab 2 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 5. After completing the hands-on lab, complete and submit the Lab 2 Assessment Worksheet. Use the worksheet that you saved to your computer. Be sure to save it again before submitting it. Module 2

CRITICAL THINKING ASSIGNMENT (55 points) Information Security in Organizations Choose one of the following two assignments to complete this week. Do not complete both assignments. Identify your assignment choice in the title of your submission. Note that while there are two options for this Critical Thinking Assignment, there is only one rubric. Review the rubric to confirm that you are meeting the assignment requirements. Option #1: Information security within organizations has evolved and become much more complex. Answer the following questions in a paper: How has computer security evolved into modern information security? Who should lead a security team? Should the approach to security be more managerial or technical? Why? What are the functions of laws, regulations, and professional organizations within information security? Option #2: Information security can be a major concern in many organizations. Answer the following questions in a paper: Why is information security a management problem? What can management do that technology cannot? LAB (20 points) Lab 3 Configure Windows File System Permissions When considering security, many professionals often start with configuring file permissions. This lab provides an opportunity to configure file permissions on a Windows-based system. Follow the steps below to complete this assignment: 1. Open the Lab 3 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 5. After completing the hands-on lab, complete and submit the Lab 3 Assessment Worksheet. (Use the

Module 3 PORTFOLIO PROJECT MILESTONE (25 points) Portfolio Topic Option #1: Major Information Security Incident Submit your Portfolio Project topic to your instructor for preliminary approval. Provide reasons for your choice. Your submission should contain no more than one page of content, framed by a cover page and references page. This assignment is required and is worth 25 points toward your final project grade. Portfolio Topic Option #2: 2016 Security Trends Submit your Portfolio Project topic to your instructor for preliminary approval. Provide reasons for your choice. Your submission should contain no more than one page of content, framed by a cover page and references page. This assignment is required and is worth 25 points toward your final project grade. CRITICAL THINKING ASSIGNMENT (55 points) Security Policies Choose one of the following two assignments to complete this week. Do not complete both assignments. Identify your assignment choice in the title of your submission. Note that while there are two options for this Critical Thinking Assignment, there is only one rubric. Review the rubric to confirm that you are meeting the assignment requirements. Option #1: The policies that organizations put in place are similar to laws, in that they are directives for how to act properly. Like laws, policies should be impartial and fair, and are often founded on the ethical and moral belief systems of the people who create them. In some cases, especially when organizations expand into foreign countries, they experience a form of culture shock when the laws of their new host country conflict with their internal policies. Suppose that SLS Corporation has expanded its operations into your country. Setting aside any required changes that SLS makes to its policies to conform to your local laws, does SLS have an ethical imperative to modify its policies to better meet the needs of its stakeholders and their geographical region/country? Option #2: The Electronic Frontier Foundation is one of the leading non-profit organization defending civil liberties in the digital world. Address the following in a paper: Using a web browser, go to www.eff.org. What are the current top concerns of this organization?

Module 4 LAB (20 points) Lab 4 Manage Group Policy Objects in Active Directory In Windows-based networks, Group Policy provides a mechanism to control various aspects of network operation, performance, and security. This lab will introduce you to the management of group policy objects in a Windows server. Follow the steps below to complete this assignment: 1. Open the Lab 4 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 5. After completing the hands-on lab, complete and submit the Lab 4 Assessment Worksheet. (Use the CRITICAL THINKING ASSIGNMENT (60 points) Risk Management Choose one of the following two assignments to complete this week. Do not complete both assignments. Identify your assignment choice in the title of your submission. Note that while there are two options for this Critical Thinking Assignment, there is only one rubric. Review the rubric to confirm that you are meeting the assignment requirements. Option #1: Conduct research on the internet to identify a recent cyber attack on an organization. Describe the occurrence and what could have been done to prevent the situation or lessen its impact. How might risk management have been used to lessen the impact? Option #2: Risk management has become more of a concern to senior leaders in organizations over the years. Answer the following questions in a paper: What is risk management? Why is the identification of risks and vulnerabilities related to assets so important in risk management?

Module 5 PORTFOLIO PROJECT MILESTONE (25 points) Options #1/#2 Submit an outline of your Portfolio Project: State your paper topic. Provide four scholarly articles that you might consider using for your final Portfolio Project. Compose a short reason why each one is pertinent to your project. This is not a final list. The goal here is to motivate you to begin examining resources that might help you in completing your project. Add a reference section for your research sources. Format your outline according to the CSU-Global Guide to Writing and APA. LAB (20 points) Lab 5 Configure Windows Firewall One important aspect of any cybersecurity plan is a firewall. While various types of firewalls exist, their key purpose is to provide a barrier of protection between an internal and external network. In this lab, you will have the opportunity to configure a Windows firewall. Follow the steps below to complete this assignment: 1. Open the Lab 5 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 5. After completing the hands-on lab, complete and submit the Lab 5 Assessment Worksheet. (Use the CRITICAL THINKING ASSIGNMENT (60 points) Security Technology Choose one of the following two assignments to complete this week. Do not complete both assignments. Identify your assignment choice in the title of your submission. Note that while there are two options for this Critical Thinking Assignment, there is only one rubric. Review the rubric to confirm that you are meeting the assignment requirements. Option #1: An IDPS, if used correctly, can be an invaluable tool in an organization to minimize hacks. Search for commercial IDPS systems using the internet. Then answer the following questions in a paper: Which classification systems and descriptions are used? How can they be used to compare the features and components of each IDPS?

Option #2: Several online passphrase generators are available. Not having a secure password can be detrimental to a user. Address the following in a paper: Locate at least two passphrase generator on the internet and try them. What did you observe? LAB (40 points) Part 1 (Lab #6): Manage Linux Accounts Earlier in this course, you had the opportunity to experiment with the management and configuration of a Windows-based account. Linux is another popular operating system that is frequently used by organizations. This lab introduces you to the tools and techniques needed to manage Linux accounts. Follow the steps below to complete this assignment: 1. Open the Lab 6 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 5. After completing the hands-on lab, complete and submit the Lab 6 Assessment Worksheet. (Use the Part 2 (Lab #7): Configure Linux File System Permissions Now that you ve had the chance to work with Linux and Linux accounts, we will move on to another important aspect of Linux administration file system permissions. As in Windows systems, Linux has some particularities when assigning file permissions. This hands-on lab provides the opportunity to configure a Linux file system. Follow the steps below to complete this assignment: 1. Open the Lab 7 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow

Module 6 5. After completing the hands-on lab, complete and submit the Lab 7 Assessment Worksheet. (Use the CRITICAL THINKING ASSIGNMENT (60 points) Physical Security Choose one of the following two assignments to complete this week. Do not complete both assignments. Identify your assignment choice in the title of your submission. Note that while there are two options for this Critical Thinking Assignment, there is only one rubric. Review the rubric to confirm that you are meeting the assignment requirements. Option #1: Based on this week s readings and additional research, answer the following questions in a paper: What is physical security? What are the primary threats to physical security? How are these threats manifested in attacks against an organization? Option #2: Based on this week s readings and additional research, address the following in a paper: Define a secure facility. What is the primary objective of designing such a facility? What are some secondary objectives of designing a secure facility? LAB (20 points) Lab 8 Encrypt and Decrypt Files with PKI Another important means of maintaining security is through the use of public key infrastructure, or PKI. PKI is commonly used on the web (for such things as certificates) to ensure that traffic is securely encrypted prior to transmission. In this lab, you will experiment with PKI encryption techniques. Follow the steps below to complete this assignment:

Module 8 1. Open the Lab 8 Assessment Worksheet. Save a copy of the worksheet to your computer; this will allow 5. After completing the hands-on lab, complete and submit the Lab 9 Assessment Worksheet. (Use the PORTFOLIO PROJECT (300 Points) Choose one of the following two Portfolio Projects. Do not complete both assignments. Identify your assignment choice in the title of your submission. Review the Portfolio Project grading rubric to understand how you ll be graded on your final project. Option #1: Major Information Security Incident Identify a major information security incident that occurred in the recent past (within the last five years). If possible, identify a breach that occurred in, or otherwise impacted, a Fortune 500 company. Review and analyze your chosen incident based on the following questions: What went wrong? Why did it occur? Who was responsible? How could it have been prevented? What advice would you offer to prevent such an incident from occurring in the future? Preliminary Deliverables You will submit your topic choice in Week 2 and your project outline in Week 4. Both assignments should be posted to the dropbox. No points are assigned for these deliverables, but points will be deducted from your final grade on the Portfolio Project if you fail to submit these items as required. (See the Portfolio Project grading rubric for details.) Additionally, you are expected to account for the instructor's feedback in the final version of the Portfolio Project assignment. The content of your paper must be 8-10 pages in length and formatted according to the CSU-Global Guide to Writing and APA. The length is not inclusive of the title and references pages. Be clear, concise, and focused. Cite a minimum of six references (in addition to the course materials, such as the textbook or articles). At least two of these must be peer-reviewed articles. The CSU-Global Library is a good place to search for credible, scholarly sources. You may want to view the Does your paper look like this? sample paper found in the Library under the APA Guide & Resources link. Option #2: 2016 Security Trends Identify one of the biggest data breaches of 2016. If possible, identify a major breach that occurred in, or otherwise impacted, a company in 2016. Review and analyze your chosen incident based on the following questions:

What went wrong? Why did it occur? Who was responsible? How could it have been prevented? What advice would you offer to prevent such an incident from occurring in the future? Preliminary Deliverables You will submit your topic choice in Week 2 and your project outline in Week 4. Both assignments should be posted to the dropbox. No points are assigned for these deliverables, but points will be deducted from your final grade on the Portfolio Project if you fail to submit these items as required. (See the Portfolio Project grading rubric for details.) Additionally, you are expected to account for the instructor's feedback in the final version of the Portfolio Project assignment. The content of your paper must be 8-10 pages in length and formatted according to the CSU-Global Guide to Writing and APA. The length is not inclusive of the title and references pages. Be clear, concise, and focused. Cite a minimum of six references (in addition to course materials, such as the textbook or articles). At least two of these must be peer-reviewed articles. The CSU-Global Library is a good place to search for credible, scholarly sources. You may want to view the Does your paper look like this? sample paper found in the Library under the APA Guide & Resources link. Course Grading Grading Scale and Policies A 95.0 100 20% Discussion Questions 29% Critical Thinking Assignments A- 90.0 94.9 16% Labs B+ 86.7 89.9 35% Portfolio Project and Milestones B 83.3 86.6 B- 80.0 83.2 C+ 75.0 79.9 C 70.0 74.9 D 60.0 69.9 F 59.9 or below In-Classroom Policies For information on late work and incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies. Academic Integrity Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /re-purposing your own work (see CSU-Global Guide to Writing and APA Requirements for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information

on how students can avoid plagiarism by understanding what it is and how to use the Library and Internet resources. Citing Sources with APA Style All students are expected to follow the CSU-Global Guide to Writing and APA Requirements when citing in APA (based on the APA Style Manual, 6th edition) for all assignments. For details on CSU-Global APA style, please review the APA resources within the CSU-Global Library under the APA Guide & Resources link. A link to this document should also be provided within most assignment descriptions on your course s Assignments page. Disability Services Statement CSU Global is committed to providing reasonable accommodations for all persons with disabilities. Any student with a documented disability requesting academic accommodations should contact the Disability Resource Coordinator at 720-279-0650 and/or email ada@csuglobal.edu for additional information to coordinate reasonable accommodations for students with documented disabilities. Netiquette Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? Maintain an environment free of harassment, stalking, threats, abuse, insults or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.