CIS-280: Information Assurance and Security

Business, Entrepreneurship, & Professional Development
Computer Information Systems
Academic Level
Course Subject
Computer Information Systems
Course Number
Course Title
Information Assurance and Security
Credit Hours
Instructor Contact Hours Per Semester
62.00 (for 15-week classes)
Student Contact Hours Per Semester
62.00 (for 15-week classes)
Grading Method
CIS-129 & either CNT-110 or CIS-112
Catalog Course Description

An intermediate-level course that provides a comprehensive understanding of Information Assurance and Security as defined in the National Training Standard for Information Systems Security Professionals. Emphasizes Information Assurance Skills that are necessary to address government and industry security needs.

Goals, Topics, and Objectives

Core Course Topics
  1. Information Security
  2. Need for Security
  3. Legal, Ethical, and Professional Issues in Information Security
  4. Risk Management
  5. Planning for Security
  6. Security Technology: Firewalls and VPNs
  7. Intrusion Detection and Prevention Systems and other security tools
  8. Cryptography
  9. Physical Security
  10. Implementing Information Security
  11. Security and Personnel
  12. Information Security Maintenance
Core Course Learning Objectives (Separated)
  1. Demonstrate foundation knowledge of information security/assurance within the organization
  2. Demonstrate knowledge of the profession, its organizations, goals and leadership roles, literature/publications, issues and research foundations.
  3. Demonstrate knowledge of the foundations of information security including legal, regulatory and policy issues, understanding general threats against information systems including denial of service, spoofing and hijacking.*
  4. Identify, analyze and manage viruses, worms, Trojan horses, Rootkits, Botnets, Spyware, Adware, logic bombs and Advanced Persistent Threats (APT)*
  5. Demonstrate knowledge of security objectives and policy development.*
  6. Demonstrate knowledge of cryptography and public key infrastructure (PKI)*
  7. Assess and demonstrate knowledge of target hardening of network devices, operating systems and applications.*

Assessment and Requirements

Assessment of Academic Achievement

Assessment of student performance will be determined by written tests, research papers, PowerPoint presentations, and hands-on lab activities.

Approval Dates

Effective Term
Fall 2020
ILT Approval Date
AALC Approval Date
Curriculum Committee Approval Date