You are on page 1of 5

Other Course Information ITSY 1400 FUNDAMENTALS OF INFORMATION SECURITY SUMMER, 2012 Section Number: Room Number: Class

Days/Hours: Instructor: Email: Office: Phone: 5420/9001 INET MTWRFSU, TBA MS. CHRISTINE SCHUBERT-LOGUE cschubert@dcccd.edu A427 (214) 860-2363

El Centro College SCANS Statement Explanation The following table illustrates how the course specific learning outcomes provide mastery of foundation skills and workplace competencies. COURSE OUTCOME The student will identify and prioritize information assets; define an information security strategy and architecture; plan for and respond to intruders in an information system; describe legal and public relations implications of security and privacy issues; and present a disaster recovery plan for recovery of information assets after an incident.

SCANS 3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d 3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d

LEARNING OUTCOMES Explain what information security is and how it came to mean what it does today. Comprehend the history of computer security and how it evolved into information security. Differentiate threats to information systems from attacks against information systems. Assess risk based on the likelihood of occurrence and impact on an organization. Recognize why risk control is needed in todays organization. Demonstrate what an information security blueprint is and what its major components are. Explain what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning.

EVALUATION Tests, Homework, Labs Tests, Homework, Labs

3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d

Tests, Homework, Labs

3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d

Tests, Homework, Labs

3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d 3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d

Tests, Homework, Labs Tests, Homework, Labs

3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d

Tests, Homework, Labs

SCANS 2c,2d, 3a, 3b, 6a, 6d, 7a, 7b, 7c, 7d, 8a, 8d 1A, 1C, 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 3A, 3D, 4B, 4C, 5A, 5B, 5C, 6A, 6E, 7B, 7C, 7D, 7E, 8A, 8D 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 1A, 1C, 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 3A, 3D, 4B, 4C, 5A, 5B, 5C, 6A, 6E, 7B, 7C, 7D, 7E, 8A, 8D 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F 1A, 1C, 3A, 3B, 3C, 3D, 5B, 6A, 6D, 6E, 7F, 8A, 8D COMPUTATION OF FINAL GRADE

LEARNING OUTCOMES Configure and describe the two categories of intrusion detection systems. Identify and prioritize information assets. Identify and prioritize threats to information assets. Define an information security strategy and architecture. Plan for and respond to intruders in an information system Describe legal and public relations implications of security and privacy issues. Define risk management and its role in SecSDLC Identify and prioritize risk controls in organizations Describe managements role in development, maintenance, and enforcement Define and identify types of firewalls Present a disaster recovery plan for recovery of information assets after an incident.

EVALUATION Tests, Homework, Labs

Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

Student progress will be evaluated by the following means: Lecture Book Quizzes 4 Major Exams Labs- Labsim Units Domains Practice Certification Exam Discussion/Participation/Attendance Research Paper Total 10% 20% 20% 10% 10% 100% 10% 20% 50% 30% Grade Evaluation: A= 90 - 100 B= 89 - 80 C= 79 - 70 D= 69 - 60 F= 59 or below

INCOMPLETE GRADE STATEMENT Incomplete grades are given only in case of an emergency and at least 50% of the course requirements must have been completed. Request for an incomplete grade must be justified through a written statement and presented to your instructor who will decide if your request can be approved.
CONTINUING EDUCATION STUDENTS MUST COMPLETE ALL PROJECTS AND TESTS IN ORDER TO RECEIVE A CEU AWARD.

COURSE OUTLINE The instructor may alter this course outline at any time due to time constraints, loss of school days, or unforeseen problems with computer equipment, labs, etc. Assignments due each week by Sunday night at 11:00 pm. (10 Points will be deducted for each day late.) Week 1 Date 6/06-6/10 Labs-LabSim 0.0 Introduction 1.0 Access Control 2.0 Cryptography Chapter Quiz 3 6/18-6/24 3.0 Network Infrastructure Lecture Book Assignments Chapter Quiz Chapter-Lecture Book 1. Introduction to Information Security. 2. The Need for Security. 3. Legal, Ethical, and Professional Issues in Information Security. 4. Risk Management. Exam 1 take by 7/01 Chapters 1-3 5. Planning for Security. 6. Security Technology: Firewalls and VPNs, and Wireless. 7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools. 8. Cryptography. 9. Physical Security. 10. Implementing Information Security. Lecture Book Exams

6/11-6/17

Chapter Quiz

6/25-7/01

4.0 Network Attacks

Chapter Quiz

7/02-7/08

5.0 Network Security 6.0 System Security 7.0 Application Security 8.0 Organizational Security 9.0 Assessments & Audits Practice ExamsDomain All Practice ExamsDomain All Practice ExamsDomain All

Chapter Quiz

Exam 2 take by 7/15 Chapters 4-6

7/09-7/15

Chapter Quiz

7/16-7/22

Chapter Quiz

7/23-7/29

Chapter Quiz

11. Security and Personnel. 12. Information Security maintenance and eDiscovery. 13. Project Work Sessions.

Exam 3 take by 7/22 Chapters 7-10

730-8/05

Chapter Quiz

Presentation of Group Case Study

Week 10

Date 8/06-8/09

Labs-LabSim Certification Practice Exam

Lecture Book Assignments

Chapter-Lecture Book

Lecture Book Exams Exam 4 take by 8/09 Chapters 1115

COMPUTER CENTER RULES AND HOURS OF OPERATION

You might also like