Kim, D., & Solomon, M. G. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett.

Similar documents
Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social psychology (7th ed.). Upper Saddle River, NJ: Prentice Hall.

MBA 5652, Research Methods Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

Bittinger, M. L., Ellenbogen, D. J., & Johnson, B. L. (2012). Prealgebra (6th ed.). Boston, MA: Addison-Wesley.

Dowling, P. J., Festing, M., & Engle, A. (2013). International human resource management (6th ed.). Boston, MA: Cengage Learning.

BHA 4053, Financial Management in Health Care Organizations Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

BSM 2801, Sport Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

BOS 3001, Fundamentals of Occupational Safety and Health Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

MBA6941, Managing Project Teams Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

BUS 4040, Communication Skills for Leaders Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. Academic Integrity

Shank, Matthew D. (2009). Sports marketing: A strategic perspective (4th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

Valcik, N. A., & Tracy, P. E. (2013). Case studies in disaster response and emergency management. Boca Raton, FL: CRC Press.

PSY 1010, General Psychology Course Syllabus. Course Description. Course etextbook. Course Learning Outcomes. Credits.

Lyman, M. D. (2011). Criminal investigation: The art and the science (6th ed.). Upper Saddle River, NJ: Prentice Hall.

MEE 6501, Advanced Air Quality Control Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Course Description Course Textbook Course Learning Outcomes Credits Course Structure Unit Learning Outcomes: Unit Lessons: Reading Assignments:

EDIT 576 DL1 (2 credits) Mobile Learning and Applications Fall Semester 2014 August 25 October 12, 2014 Fully Online Course

EDIT 576 (2 credits) Mobile Learning and Applications Fall Semester 2015 August 31 October 18, 2015 Fully Online Course

SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

2 User Guide of Blackboard Mobile Learn for CityU Students (Android) How to download / install Bb Mobile Learn? Downloaded from Google Play Store

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online

THESIS GUIDE FORMAL INSTRUCTION GUIDE FOR MASTER S THESIS WRITING SCHOOL OF BUSINESS

Content Teaching Methods: Social Studies. Dr. Melinda Butler

Connect Microbiology. Training Guide

George Mason University Graduate School of Education Program: Special Education

COMS 622 Course Syllabus. Note:

Medical Terminology - Mdca 1313 Course Syllabus: Summer 2017

Using SAM Central With iread

Texas A&M University - Central Texas PSYK PRINCIPLES OF RESEARCH FOR THE BEHAVIORAL SCIENCES. Professor: Elizabeth K.

EDUC-E328 Science in the Elementary Schools

STUDENT MOODLE ORIENTATION

Texas A&M University-Central Texas CISK Comprehensive Networking C_SK Computer Networks Monday/Wednesday 5.

MGMT 479 (Hybrid) Strategic Management

Table of Contents. Course Delivery Method. Instructor Information. Phone: Office hours: Table of Contents. Course Description

Sul Ross State University Spring Syllabus for ED 6315 Design and Implementation of Curriculum

EMPOWER Self-Service Portal Student User Manual

NCAA Eligibility Center High School Portal Instructions. Course Module

Program Guidebook. Endorsement Preparation Program, Educational Leadership

Chemistry Senior Seminar - Spring 2016

Demography and Population Geography with GISc GEH 320/GEP 620 (H81) / PHE 718 / EES80500 Syllabus

INTERNAL MEDICINE IN-TRAINING EXAMINATION (IM-ITE SM )

BLACKBOARD TRAINING PHASE 2 CREATE ASSESSMENT. Essential Tool Part 1 Rubrics, page 3-4. Assignment Tool Part 2 Assignments, page 5-10

Android App Development for Beginners

ACCOUNTING FOR LAWYERS SYLLABUS

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Spring 2015 IET4451 Systems Simulation Course Syllabus for Traditional, Hybrid, and Online Classes

The University of Texas at Tyler College of Business and Technology Department of Management and Marketing SPRING 2015

Blackboard Communication Tools

U of S Course Tools. Open CourseWare (OCW)

SAMPLE. ORG423: Communication Strategies for Leaders

Spring 2015 CRN: Department: English CONTACT INFORMATION: REQUIRED TEXT:

Assessment System for M.S. in Health Professions Education (rev. 4/2011)

Monday/Wednesday, 9:00 AM 10:30 AM

University of Massachusetts Lowell Graduate School of Education Program Evaluation Spring Online

BIOH : Principles of Medical Physiology

Appendix L: Online Testing Highlights and Script

Course Specification Executive MBA via e-learning (MBUSP)

CEEF 6306 Lifespan Development New Orleans Baptist Theological Seminary

FAU Mobile App Goes Live

Graduate Program in Education

Academic Support Services Accelerated Learning Classes The Learning Success Center SMARTHINKING Student computer labs Adult Education

TUCSON CAMPUS SCHOOL OF BUSINESS SYLLABUS

SECTION 12 E-Learning (CBT) Delivery Module

AST Introduction to Solar Systems Astronomy

Academic Integrity RN to BSN Option Student Tutorial

General Microbiology (BIOL ) Course Syllabus

Texas A&M University - Central Texas PSYK EDUCATIONAL PSYCHOLOGY INSTRUCTOR AND CONTACT INFORMATION

User Guide. LSE for You: Graduate Course Choices. London School of Economics and Political Science Houghton Street, London WC2A 2AE

Maintaining Resilience in Teaching: Navigating Common Core and More Online Participant Syllabus

Page 1 of 8 REQUIRED MATERIALS:

TA Certification Course Additional Information Sheet

1. Portal Screen Default Display

Accounting 380K.6 Accounting and Control in Nonprofit Organizations (#02705) Spring 2013 Professors Michael H. Granof and Gretchen Charrier

AGN 331 Soil Science. Lecture & Laboratory. Face to Face Version, Spring, Syllabus

Houghton Mifflin Online Assessment System Walkthrough Guide

TU-E2090 Research Assignment in Operations Management and Services

Field Experience Management 2011 Training Guides

Higher Education / Student Affairs Internship Manual

AGN 331 Soil Science Lecture & Laboratory Face to Face Version, Spring, 2012 Syllabus

SPM 5309: SPORT MARKETING Fall 2017 (SEC. 8695; 3 credits)

Be aware there will be a makeup date for missed class time on the Thanksgiving holiday. This will be discussed in class. Course Description

- COURSE DESCRIPTIONS - (*From Online Graduate Catalog )

Carolina Course Evaluation Item Bank Last Revised Fall 2009

TotalLMS. Getting Started with SumTotal: Learner Mode

Adler Graduate School

Examity - Adding Examity to your Moodle Course

Automating Outcome Based Assessment

The New Venture Business Plan BAEP 554

SYLLABUS- ACCOUNTING 5250: Advanced Auditing (SPRING 2017)

Introduction to Moodle

POFI 1349 Spreadsheets ONLINE COURSE SYLLABUS

Syllabus: INF382D Introduction to Information Resources & Services Spring 2013

MyUni - Turnitin Assignments

Beginning Blackboard. Getting Started. The Control Panel. 1. Accessing Blackboard:

Instructor Experience and Qualifications Professor of Business at NDNU; Over twenty-five years of experience in teaching undergraduate students.

Office Location: LOCATION: BS 217 COURSE REFERENCE NUMBER: 93000

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Test Administrator User Guide

GLBL 210: Global Issues

Transcription:

ITC 4390, Internet and Network Security Course Syllabus Course Description Practical examination of information security fundamentals. Includes security planning, technologies, and personnel issues. Covers material helpful in the preparation for the Security+ certification exam. Course Textbook Kim, D., & Solomon, M. G. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett. Course Learning Outcomes Upon completion of this course, students should be able to: 1. Discuss the dimensions of threat to an organization's mission in a globally networked environment and the implications of interconnectivity. 2. Examine the types and ranges of current vulnerabilities and threats to which an organization's information assets may be exposed. 3. Describe the inter-relationships among mission, information assets, threats to those assets, and infra-structure vulnerabilities. 4. Explain organizational information risk management approaches that can be integrated into the on-going business management practices of an enterprise. 5. Describe the application of state-of-the-practice techniques for protecting information. 6. Identify mission-oriented protection strategies, such as information survivability. 7. Facilitate policy and resource decisions related to information technology security. 8. Develop a contextual framework as a touchstone for planning and implementing information security management. 9. Develop an approach for staying current with trends and requisite skills in information security. Credits Upon completion of this course, the students will earn three (3) hours of college credit. Course Structure 1. Unit Learning Outcomes: Each unit contains Unit Learning Outcomes that specify the measurable skills and knowledge students should gain upon completion of the unit. 2. Unit Lesson: Each unit contains a Unit Lesson, which discusses lesson material. 3. Reading Assignments: Each unit contains Reading Assignments from one or more chapters from the textbook. Suggested Readings are provided Units II and VIII to aid students in their course of study. 4. Discussion Boards: Discussion Boards are a part of all CSU term courses. Information and specifications regarding these assignments are provided in the Academic Policies listed in the Course Menu bar. 5. Unit Assessments: This course contains four Unit Assessments, one to be completed at the end of Unit II, IV, VI, and VII. Assessments are composed of multiple-choice questions and written response questions. 6. Unit Assignments: Students are required to submit for grading Unit Assignments in Units I-VI. Specific information and instructions regarding these assignments are provided below. 7. Final Exam (Proctored): Students are to complete a Final Exam in Unit VIII. All Final Exams are proctored see below for additional information. You are permitted four (4) hours to complete this exam, in the presence of your approved proctor. This is an open book exam. ITC 4390, Internet and Network Security 1

8. Ask the Professor: This communication forum provides you with an opportunity to ask your professor general or course content related questions. 9. Student Break Room: This communication forum allows for casual conversation with your classmates. CSU Online Library There is a virtual library with resources, including both journals and ebooks, to support your program and your course at Columbia Southern University. eresources are accessible 24 hours a day/7 days a week from the CSU Online Library gateway page. To access the library, log into mycsu, and then click on CSU Online Library. Resources are organized in the library by title, but if you click on Research Guides, you will find eresources arranged by subject. The Library Reference service is available 7 days a week; you can reach CSU s virtual librarians by e-mailing thevirtuallibrarian@columbiasouthern.edu. These professional librarians will be glad to help you develop your research plan or to assist you in any way in finding relevant, appropriate, and timely information. Librarian responses may occur within minutes or hours, but it will never take more than 24 hours for a librarian to send a response to the e-mail address you have provided. Replies to reference requests may include customized keyword search strategies, links to videos, research guides, screen captures, attachments, a phone call, live screen sharing, meeting room appointments, and other forms of instruction. Unit Assignments Unit I PowerPoint Presentation Create a seven- to ten-slide presentation on Information Systems Security and IT infrastructure. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function. Be sure to include the following: definition of Information Systems Security and the three tenants of ISS, the seven domains and the layered security approach, data classification of an IT infrastructure, and explanation of how the IT security policy framework is used to reduce risks and threats. Unit II PowerPoint Presentation Create a five- to seven-slide presentation on Risk Management Planning. You may use various sources including your textbook. Be sure to cite any sources used in a separate reference slide with proper APA formatting. (Cover and reference slide do not count). You may also use the slide notes function to explain slide contents as necessary. Your presentation should include the following: definition of Risk Management, A-I-C Compliance, Qualitative and Quantitative Risk Analysis, Risk Response Planning, and implementation of a BIA, BCP and DRP. Unit III PowerPoint Presentation Create a five- to seven-slide presentation on Access Controls. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting.(cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. ITC 4390, Internet and Network Security 2

Be sure to include the following: define of the four parts of Access Controls, discussion of two phases of Access Control, description of three Authentication Types, and explanation of how the use of authentication types techniques impact security. Unit IV PowerPoint Presentation Create a five- to seven-slide presentation on the Security Audit process. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting (Cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. Be sure to include the following: definition of the risk review activities, identification of the four organizational permission levels, definition of the purpose of a security audit, and Discussion of the six phases of a security audit plan. Unit V PowerPoint Presentation Create a five- to seven-slide presentation on the keyword mixed alphabet cipher. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting. (Cover and reference slides do not count). You may also use the slide notes function to explain slide contents as necessary. Be sure to include the following: Explain how the cipher works. Identify the three elements that ensure the security of the cipher. Include an example of the cipher process by creating a unique keyword and encrypting the following plaintext message. Plaintext: IT SECURITY IS CRITICAL. Unit VI PowerPoint Presentation Create a five- to seven-slide presentation on the network types. You may use various sources including your textbook. Be sure to cite any sources used in a reference slide with proper APA formatting.(cover and reference slides do not count).you may also use the slide notes function to explain slide contents as necessary. Be sure to include the following: Describe and provide a diagram of a local area network (LAN). Describe and provide a diagram of a wide area network (WAN). Discuss the placement and purpose of routers, switches, and firewalls in both configurations. ITC 4390, Internet and Network Security 3

APA Guidelines The application of the APA writing style shall be practical, functional, and appropriate to each academic level, with the primary purpose being the documentation (citation) of sources. CSU requires that students use APA style for certain papers and projects. Students should always carefully read and follow assignment directions and review the associated grading rubric when available. Students can find CSU s Citation Guide in the mycsu Student Portal by clicking on the Citation Resources link in the Learning Resources area. This document includes examples and sample papers and provides information on how to contact the CSU Success Center. Grading Rubrics This course utilizes analytic grading rubrics as tools for your professor in assigning grades for all learning activities. Each rubric serves as a guide that communicates the expectations of the learning activity and describes the criteria for each level of achievement. In addition, a rubric is a reference tool that lists evaluation criteria and can help you organize your efforts to meet the requirements of that learning activity. It is imperative for you to familiarize yourself with these rubrics because these are the primary tools your professor uses for assessing learning activities. Rubric categories include: (1) Discussion Board, (2) Assessment (Written Response), and (3) Assignment. However, it is possible that not all of the listed rubric types will be used in a single course (e.g., some courses may not have Assessments). The Discussion Board rubric can be found within Unit I s Discussion Board submission instructions. The Assessment (Written Response) rubric can be found embedded in a link within the directions for each Unit Assessment. However, these rubrics will only be used when written-response questions appear within the Assessment. Each Assignment type (e.g., article critique, case study, research paper) will have its own rubric. The Assignment rubrics are built into Blackboard, allowing students to review them prior to beginning the Assignment and again once the Assignment has been scored. This rubric can be accessed via the Assignment link located within the unit where it is to be submitted. Students may also access the rubric through the course menu by selecting Tools and then My Grades. Again, it is vitally important for you to become familiar with these rubrics because their application to your Discussion Boards, Assessments, and Assignments is the method by which your instructor assigns all grades. Final Examination Guidelines Final Exams are to be administered to students by an approved Proctor. CSU approves two flexible proctoring options: a standard Proctor, who is chosen by the student and approved by the university, or Remote Proctor Now (RP Now), an ondemand, third-party testing service that proctors examinations for a small fee. Students choosing RP Now must have an operational webcam/video with audio, a high-speed Internet connection, and the appropriate system rights required to download and install software. To review the complete Examination Proctor Policy, including a list of acceptable Proctors, Proctor responsibilities, Proctor approval procedures, and the Proctor Agreement Form, go to the mycsu Student Portal from the link below. http://mycsu.columbiasouthern.edu You are permitted four (4) hours to complete this exam in the presence of your approved Proctor. This is an open book exam. Only course textbooks, writing utensils, and a calculator, if necessary, are allowed when taking proctored exams. You may use only your textbook as source material for your response. All source material must be referenced (paraphrased and quoted material must have accompanying citations). You may use the Publication Manual of the American Psychological Association (APA Style Guide) or the CSU Citation Guide for reference. ITC 4390, Internet and Network Security 4

Communication Forums These are non-graded discussion forums that allow you to communicate with your professor and other students. Participation in these discussion forums is encouraged, but not required. You can access these forums with the buttons in the Course Menu. Instructions for subscribing/unsubscribing to these forums are provided below. Click here for instructions on how to subscribe/unsubscribe and post to the Communication Forums. Ask the Professor This communication forum provides you with an opportunity to ask your professor general or course content questions. Questions may focus on Blackboard locations of online course components, textbook or course content elaboration, additional guidance on assessment requirements, or general advice from other students. Questions that are specific in nature, such as inquiries regarding assessment/assignment grades or personal accommodation requests, are NOT to be posted on this forum. If you have questions, comments, or concerns of a nonpublic nature, please feel free to e-mail your professor. Responses to your post will be addressed or e-mailed by the professor within 48 hours. Before posting, please ensure that you have read all relevant course documentation, including the syllabus, assessment/assignment instructions, faculty feedback, and other important information. Student Break Room This communication forum allows for casual conversation with your classmates. Communication on this forum should always maintain a standard of appropriateness and respect for your fellow classmates. This forum should NOT be used to share assessment answers. Grading Discussion Boards (8 @ 2%) = 16% Assessments (4 @ 6%) = 24% PowerPoint Presentations (6 @ 6%) = 36% Final Exam = 24% Total = 100% Course Schedule/Checklist (PLEASE PRINT) The following pages contain a printable Course Schedule to assist you through this course. By following this schedule, you will be assured that you will complete the course within the time allotted. ITC 4390, Internet and Network Security 5

ITC 4390, Internet and Network Security Course Schedule By following this schedule, you will be assured that you will complete the course within the time allotted. Please keep this schedule for reference as you progress through your course. Unit I Information Security and Communication Unit Study Guide Chapter 1: Information Systems Security Chapter 2: Changing How People and Businesses Communicate Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by PowerPoint Presentation by Unit II Attacks, Threats and IS Business Drivers Unit Study Guide Chapter 3: Malicious Attacks, Threats, and Vulnerabilities Chapter 4: The Drivers of the Information Security Business Suggested Reading: See Study Guide Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by Assessment by PowerPoint Presentation by Proctor Approval Form Unit III Access Controls, Security Operations and Administration Unit Study Guide Chapter 5: Access Controls Chapter 6: Security Operations and Administration Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by PowerPoint Presentation by ITC 4390, Internet and Network Security 6

ITC 4390, Internet and Network Security Course Schedule Unit IV Security Policies and Procedures; Auditing to Recovery Unit Study Guide Chapter 7: Auditing, Testing, and Monitoring Chapter 8: Risk, Response, and Recovery Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by Assessment by PowerPoint Presentation by Unit V Cryptography Unit Study Guide Chapter 9: Cryptography Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by PowerPoint Presentation by Unit VI Networks, Telecommunications, Malicious Code, and Activity Unit Study Guide Chapter 10: Networks and Telecommunications Chapter 11: Malicious Code and Activity Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by Assessment by PowerPoint Presentation by ITC 4390, Internet and Network Security 7

ITC 4390, Internet and Network Security Course Schedule Unit VII Information Security Standards, Education and Training Unit Study Guide Chapter 12: Information Security Standards Chapter 13: Information Security Education and Training Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by Assessment by Request to take Final Exam Unit VIII Information Security Professional Certification and U.S. Compliance Laws Unit Study Guide Chapter 14: Information Security Professional Certifications Chapter 15: U.S. Compliance Laws Suggested Reading: See Study Guide Discussion Board Response: Submit your response to the Discussion Board question by Saturday, Discussion Board Comment: Comment on another student s Discussion Board response by Final Exam by ITC 4390, Internet and Network Security 8