Boyle, R. J., & Panko, R. R. (2015). Corporate computer security (4th ed.). Upper Saddle River, NJ: Pearson.

Similar documents
BSM 2801, Sport Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Dowling, P. J., Festing, M., & Engle, A. (2013). International human resource management (6th ed.). Boston, MA: Cengage Learning.

MBA 5652, Research Methods Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

BHA 4053, Financial Management in Health Care Organizations Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

Bittinger, M. L., Ellenbogen, D. J., & Johnson, B. L. (2012). Prealgebra (6th ed.). Boston, MA: Addison-Wesley.

Valcik, N. A., & Tracy, P. E. (2013). Case studies in disaster response and emergency management. Boca Raton, FL: CRC Press.

BOS 3001, Fundamentals of Occupational Safety and Health Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

PSY 1010, General Psychology Course Syllabus. Course Description. Course etextbook. Course Learning Outcomes. Credits.

Shank, Matthew D. (2009). Sports marketing: A strategic perspective (4th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

MBA6941, Managing Project Teams Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

BUS 4040, Communication Skills for Leaders Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. Academic Integrity

Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social psychology (7th ed.). Upper Saddle River, NJ: Prentice Hall.

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

MEE 6501, Advanced Air Quality Control Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Lyman, M. D. (2011). Criminal investigation: The art and the science (6th ed.). Upper Saddle River, NJ: Prentice Hall.

Course Description Course Textbook Course Learning Outcomes Credits Course Structure Unit Learning Outcomes: Unit Lessons: Reading Assignments:

COMS 622 Course Syllabus. Note:

MGMT 479 (Hybrid) Strategic Management

Medical Terminology - Mdca 1313 Course Syllabus: Summer 2017

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

ACCOUNTING FOR MANAGERS BU-5190-OL Syllabus

University of Massachusetts Lowell Graduate School of Education Program Evaluation Spring Online

Content Teaching Methods: Social Studies. Dr. Melinda Butler

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

ACCOUNTING FOR MANAGERS BU-5190-AU7 Syllabus

George Mason University Graduate School of Education Program: Special Education

EDIT 576 (2 credits) Mobile Learning and Applications Fall Semester 2015 August 31 October 18, 2015 Fully Online Course

EDIT 576 DL1 (2 credits) Mobile Learning and Applications Fall Semester 2014 August 25 October 12, 2014 Fully Online Course

Office Hours: Day Time Location TR 12:00pm - 2:00pm Main Campus Carl DeSantis Building 5136

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online

BIOH : Principles of Medical Physiology

EDUC-E328 Science in the Elementary Schools

ENG 111 Achievement Requirements Fall Semester 2007 MWF 10:30-11: OLSC

SAMPLE. ORG423: Communication Strategies for Leaders

AGN 331 Soil Science. Lecture & Laboratory. Face to Face Version, Spring, Syllabus

Texas A&M University - Central Texas PSYK PRINCIPLES OF RESEARCH FOR THE BEHAVIORAL SCIENCES. Professor: Elizabeth K.

Course Syllabus Chem 482: Chemistry Seminar

AGN 331 Soil Science Lecture & Laboratory Face to Face Version, Spring, 2012 Syllabus

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Texas A&M University-Central Texas CISK Comprehensive Networking C_SK Computer Networks Monday/Wednesday 5.

2 User Guide of Blackboard Mobile Learn for CityU Students (Android) How to download / install Bb Mobile Learn? Downloaded from Google Play Store

ACC 362 Course Syllabus

Texas A&M University - Central Texas PSYK EDUCATIONAL PSYCHOLOGY INSTRUCTOR AND CONTACT INFORMATION

Assessment and Evaluation

ITED350.02W Spring 2016 Syllabus

Maintaining Resilience in Teaching: Navigating Common Core and More Online Participant Syllabus

Business Computer Applications CGS 1100 Course Syllabus. Course Title: Course / Prefix Number CGS Business Computer Applications

K 1 2 K 1 2. Iron Mountain Public Schools Standards (modified METS) Checklist by Grade Level Page 1 of 11

Economics 201 Principles of Microeconomics Fall 2010 MWF 10:00 10:50am 160 Bryan Building

ACC 380K.4 Course Syllabus

Sul Ross State University Spring Syllabus for ED 6315 Design and Implementation of Curriculum

1. Portal Screen Default Display

School: Business Course Number: ACCT603 General Accounting and Business Concepts Credit Hours: 3 hours Length of Course: 8 weeks Prerequisite: None

WE ARE EXCITED TO HAVE ALL OF OUR FFG KIDS BACK FOR OUR SCHOOL YEAR PROGRAM! WE APPRECIATE YOUR CONTINUED SUPPORT AS WE HEAD INTO OUR 8 TH SEASON!

GLBL 210: Global Issues

ASTR 102: Introduction to Astronomy: Stars, Galaxies, and Cosmology

COURSE SYLLABUS HSV 347 SOCIAL SERVICES WITH CHILDREN

PSCH 312: Social Psychology

EDU 614: Advanced Educational Psychology Online Course Dr. Jim McDonald

MGMT 3362 Human Resource Management Course Syllabus Spring 2016 (Interactive Video) Business Administration 222D (Edinburg Campus)

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Introduction to Sociology SOCI 1101 (CRN 30025) Spring 2015

Dutchess Community College College Connection Program

COMM 210 Principals of Public Relations Loyola University Department of Communication. Course Syllabus Spring 2016

Chemistry 106 Chemistry for Health Professions Online Fall 2015

Graduate Program in Education

George Mason University College of Education and Human Development Secondary Education Program. EDCI 790 Secondary Education Internship

THESIS GUIDE FORMAL INSTRUCTION GUIDE FOR MASTER S THESIS WRITING SCHOOL OF BUSINESS

Foothill College Summer 2016

STRATEGIC LEADERSHIP PROCESSES

Georgetown University School of Continuing Studies Master of Professional Studies in Human Resources Management Course Syllabus Summer 2014

TUCSON CAMPUS SCHOOL OF BUSINESS SYLLABUS

Adler Graduate School

Assessment System for M.S. in Health Professions Education (rev. 4/2011)

STUDENT MOODLE ORIENTATION

UNIVERSITY of NORTH GEORGIA

Chemistry Senior Seminar - Spring 2016

Global Seminar Quito, Ecuador Language, Culture & Child Development. EDS 115 GS Cognitive Development & Education Summer Session I, 2016

Introduction to Information System

COURSE DESCRIPTION PREREQUISITE COURSE PURPOSE

The University of Southern Mississippi

UNDERGRADUATE SEMINAR

International Environmental Policy Spring :374:315:01 Tuesdays, 10:55 am to 1:55 pm, Blake 131

Learning Resource Center COLLECTION DEVELOPMENT POLICY

U of S Course Tools. Open CourseWare (OCW)

ED487: Methods for Teaching EC-6 Social Studies, Language Arts and Fine Arts

ACCOUNTING FOR LAWYERS SYLLABUS

Instructor. Darlene Diaz. Office SCC-SC-124. Phone (714) Course Information

International Business BADM 455, Section 2 Spring 2008

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

SY 6200 Behavioral Assessment, Analysis, and Intervention Spring 2016, 3 Credits

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

MATH 1A: Calculus I Sec 01 Winter 2017 Room E31 MTWThF 8:30-9:20AM

GEB 6930 Doing Business in Asia Hough Graduate School Warrington College of Business Administration University of Florida

Academic Support Services Accelerated Learning Classes The Learning Success Center SMARTHINKING Student computer labs Adult Education

PBHL HEALTH ECONOMICS I COURSE SYLLABUS Winter Quarter Fridays, 11:00 am - 1:50 pm Pearlstein 308

Course Syllabus p. 1. Introduction to Web Design AVT 217 Spring 2017 TTh 10:30-1:10, 1:30-4:10 Instructor: Shanshan Cui

Philosophy in Literature: Italo Calvino (Phil. 331) Fall 2014, M and W 12:00-13:50 p.m.; 103 PETR. Professor Alejandro A. Vallega.

Transcription:

SEC 3302, Advanced IS Security Course Syllabus Course Description Provides an understanding of intrusion detection practices for organization security. Students become aware of procedures for maintaining information assurance. Students analyze data traffic to determine anomalies or dangers. Course Textbook Boyle, R. J., & Panko, R. R. (2015). Corporate computer security (4th ed.). Upper Saddle River, NJ: Pearson. Course Learning Outcomes Upon completion of this course, students should be able to 1. Analyze access controls used to secure information systems. 2. Examine encryption types used for the physical security protection of an organization. 3. Analyze differences between common Information Systems (IS) terminology, such as perimeter, network, host, application, and data defenses. 4. Create vulnerability assessments related to IS security. 5. Evaluate the use of auditing tools to determine network health. 6. Explain the importance of policies, procedures, and awareness of information security. Credits Upon completion of this course, the students will earn three (3) hours of college credit. Course Structure 1. Study Guide: Each unit contains a Study Guide that provides students with the learning outcomes, unit lesson, required reading assignments, and supplemental resources. 2. Learning Outcomes: Each unit contains Learning Outcomes that specify the measurable skills and knowledge students should gain upon completion of the unit. 3. Unit Lesson: Each unit contains a Unit Lesson, which discusses lesson material. 4. Reading Assignments: Each unit contains Reading Assignments from one or more chapters from the textbook. 5. Suggested Reading: Suggested Readings are listed in each unit s study guide. Students are encouraged to read the resources listed if the opportunity arises, but they will not be tested on their knowledge of the Suggested Readings. 6. Learning Activities (Non-Graded): These non-graded Learning Activities are provided to aid students in their course of study. 7. Discussion Boards: Discussion Boards are part of all CSU term courses. More information and specifications can be found in the Student Resources link listed in the Course Menu bar. 8. Unit Assessments: This course contains four Unit Assessments, one to be completed at the end of Units I, II, IV, and VI. Assessments are composed of written-response questions. 9. Unit Assignments: Students are required to submit for grading Unit Assignments in Units III, V, VII, and VIII. Specific information and instructions regarding these assignments are provided below. Grading rubrics are included with each assignment. Specific information about accessing these rubrics is provided below. SEC 3302, Advanced IS Security 1

10. Ask the Professor: This communication forum provides you with an opportunity to ask your professor general or course content related questions. 11. Student Break Room: This communication forum allows for casual conversation with your classmates. CSU Online Library The CSU Online Library is available to support your courses and programs. The online library includes databases, journals, e-books, and research guides. These resources are always accessible and can be reached through the library webpage. To access the library, log into the mycsu Student Portal, and click on CSU Online Library. You can also access the CSU Online Library from the My Library button on the course menu for each course in Blackboard. The CSU Online Library offers several reference services. E-mail (library@columbiasouthern.edu) and telephone (1.877.268.8046) assistance is available Monday Thursday from 8 am to 5 pm and Friday from 8 am to 3 pm. The library s chat reference service, Ask a Librarian, is available 24/7; look for the chat box on the online library page. Librarians can help you develop your research plan or assist you in finding relevant, appropriate, and timely information. Reference requests can include customized keyword search strategies, links to articles, database help, and other services. Unit Assignments Unit III PowerPoint Presentation Encryption Methods The learning outcome of the unit addresses encryption methods, including encryption keys, authentication, and certificates. This unit also explores how these concepts are used in IT within practical, real-world scenarios. Assignment Instructions: Imagine that you are an IT security manager charged with explaining encryption to senior management. Create a PowerPoint presentation of at least seven slides that explains encryption concepts in understandable terminology. Be sure to discuss at least two different encryption methods and corresponding encryption keys. How are encryption and authentication related? Be sure to provide examples of how encryption is used in your organization. Be sure to cite all sources used in a reference slide with proper APA formatting. You must use at least two peer-reviewed sources found in the CSU Online Library in your presentation. Title and references slides do not count in the length requirement. You may also use the speaker s notes function for the presentation part of your PowerPoint presentation and to provide a transition from one slide to the next. Information about accessing the grading rubric for this assignment is provided below. Unit V PowerPoint Presentation The learning outcome of the unit addresses the use of auditing tools to determine network health. For firewalls, this generally includes an internal logging faction and tools like intrusion detection systems (IDS) and intrusion prevention systems (IPS). This unit also explores how these concepts are used in IT within practical, real-world scenarios. Assignment Instructions: Assume that you are a newly hired IT security manager. Your company has reported rapid growth but has had a hard time keeping up with security demands. Recently, unexpectedly, they lost their network administrator who also handled security. After completing your assessment of the network, the security policies, and the tools being used, you have discovered that auditing tools and logs have not been used properly. You also discovered that the company does not currently have intrusion detection systems (IDS) and intrusion prevention systems (IPS) tools. You are charged with explaining the deficiencies to senior management. You also want to justify the purchase of IDS and IPS tools for the company. SEC 3302, Advanced IS Security 2

Create a PowerPoint presentation of at least seven slides that explains the following tools: 1. Logs: Explain the purpose of monitoring logs, their importance in understanding threats, what information the logs contain, and their relevance as an auditing tool in determining network health. 2. IDS/IPS tools: What are they, and how do they work? How may they be used as auditing tools in assessing network health? 3. Be sure to provide examples of how these tools should be used in your organization. Be sure to cite all sources used in a references slide with proper APA formatting. For your total slide count, title and references slides are not included in the total slide count. You may also use the speaker s notes function for the presentation part of your PowerPoint presentation and to provide a transition from one slide to the next. Information about accessing the grading rubric for this assignment is provided below. Unit VII Case Study Application Security and Data Protection The learning outcome of the unit addresses the importance of policies, procedures, and awareness of information security. This unit explores concepts around application security and data protection as well. Assignment Instructions: Analyze the case study titled Application Front-running on pages 468 469 in the textbook. For this assignment, you will need to address the following: 1. analyze the events of the hacked Twitter account, 2. explain the organizational impact of not having strong policies and procedures for securing applications and data, 3. develop five web application policies and five data protection policies based on the information found in the case, 4. address the methods an IT security manager can use to increase organizational awareness of policies and procedures in information security, and 5. summarize your findings in a two- to three-page paper. Information about accessing the grading rubric for this assignment is provided below. Unit VIII Assignment Vulnerability Assessment Planning For this assignment, you will need to develop a vulnerability assessment plan. The concepts needed to complete this assignment are found in your reading assignment and in the unit lesson, but you can draw on all of the lessons thus far in this course. Choose one of the following businesses: e-commerce retailer, a retailer with his/her own credit card, a money transfer/loan company, or a personal prescription/medical supply home delivery service. Be sure that you address the following in your plan: 1. Provide a list of at least five different hosts pertinent to the business that you chose. 2. For each host chosen, describe how it will be assessed and what threats to the host are being assessed. (Also, describe the circumstances surrounding the threats, such as when and how often). 3. Explain your reasoning for choosing a specific assessment for each host. 4. Describe the format that your vulnerability assessment plan would be delivered in, and describe who will receive and review the results. SEC 3302, Advanced IS Security 3

Summarize your findings in a paper consisting of at least three pages. Information about accessing the grading rubric for this assignment is provided below. APA Guidelines The application of the APA writing style shall be practical, functional, and appropriate to each academic level, with the primary purpose being the documentation (citation) of sources. CSU requires that students use APA style for certain papers and projects. Students should always carefully read and follow assignment directions and review the associated grading rubric when available. Students can find CSU s Citation Guide by clicking here. This document includes examples and sample papers and provides information on how to contact the CSU Success Center. Grading Rubrics This course utilizes analytic grading rubrics as tools for your professor in assigning grades for all learning activities. Each rubric serves as a guide that communicates the expectations of the learning activity and describes the criteria for each level of achievement. In addition, a rubric is a reference tool that lists evaluation criteria and can help you organize your efforts to meet the requirements of that learning activity. It is imperative for you to familiarize yourself with these rubrics because these are the primary tools your professor uses for assessing learning activities. Rubric categories include: (1) Discussion Board, (2) Assessment (Written Response), and (3) Assignment. However, it is possible that not all of the listed rubric types will be used in a single course (e.g., some courses may not have Assessments). The Discussion Board rubric can be found within Unit I s Discussion Board submission instructions. The Assessment (Written Response) rubric can be found embedded in a link within the directions for each Unit Assessment. However, these rubrics will only be used when written-response questions appear within the Assessment. Each Assignment type (e.g., article critique, case study, research paper) will have its own rubric. The Assignment rubrics are built into Blackboard, allowing students to review them prior to beginning the Assignment and again once the Assignment has been scored. This rubric can be accessed via the Assignment link located within the unit where it is to be submitted. Students may also access the rubric through the course menu by selecting Tools and then My Grades. Again, it is vitally important for you to become familiar with these rubrics because their application to your Discussion Boards, Assessments, and Assignments is the method by which your instructor assigns all grades. Communication Forums These are non-graded discussion forums that allow you to communicate with your professor and other students. Participation in these discussion forums is encouraged, but not required. You can access these forums with the buttons in the Course Menu. Instructions for subscribing/unsubscribing to these forums are provided below. Click here for instructions on how to subscribe/unsubscribe and post to the Communication Forums. Ask the Professor This communication forum provides you with an opportunity to ask your professor general or course content questions. Questions may focus on Blackboard locations of online course components, textbook or course content elaboration, additional guidance on assessment requirements, or general advice from other students. Questions that are specific in nature, such as inquiries regarding assessment/assignment grades or personal accommodation requests, are NOT to be posted on this forum. If you have questions, comments, or concerns of a nonpublic nature, please feel free to email your professor. Responses to your post will be addressed or emailed by the professor within 48 hours. SEC 3302, Advanced IS Security 4

Before posting, please ensure that you have read all relevant course documentation, including the syllabus, assessment/assignment instructions, faculty feedback, and other important information. Student Break Room This communication forum allows for casual conversation with your classmates. Communication on this forum should always maintain a standard of appropriateness and respect for your fellow classmates. This forum should NOT be used to share assessment answers. Grading Discussion Boards (8 @ 2%) = 16% Assessments (4 @ 8%) = 32% PowerPoint Presentations (2 @ 12%) = 24% Unit VII Case Study = 13% Unit VIII Assignment = 15% Total = 100% Course Schedule/Checklist (PLEASE PRINT) The following pages contain a printable Course Schedule to assist you through this course. By following this schedule, you will be assured that you will complete the course within the time allotted. SEC 3302, Advanced IS Security 5

SEC 3302, Advanced IS Security Course Schedule By following this schedule, you will be assured that you will complete the course within the time allotted. Please keep this schedule for reference as you progress through your course. Unit I IS Security and Basic Threats Chapter 1: The Threat Environment, pp. 1-50 Saturday, 11:59 p.m. (Central Time) Assessment by Unit II Planning and Policy Chapter 2: Planning and Policy, pp. 54-117 Assessment by Unit III Cryptography Chapter 3: Cryptography, pp. 121-178 PowerPoint Presentation by SEC 3302, Advanced IS Security 6

SEC 3302, Advanced IS Security Course Schedule Unit IV Securing Networks Chapter 4: Secure Networks, pp. 184-232 Assessment by Unit V Firewalls Chapter 6: Firewalls, pp. 304-358 PowerPoint Presentation by Unit VI Access Control Chapter 5: Access Control, pp. 236-298 Assessment by SEC 3302, Advanced IS Security 7

SEC 3302, Advanced IS Security Course Schedule Unit VII Application and Data Security Chapter 8: Application Security, pp. 420-466 Chapter 9: Data Protection, pp. 471-520 Case Study by Unit VIII Vulnerability Assessment and Incident Response Chapter 7: Host Hardening, pp. 365-415 Chapter 10: Incident and Disaster Response, pp. 526-573 Assignment by SEC 3302, Advanced IS Security 8