School
Business, Entrepreneurship, and Professional Development
Division
Computer Technology
Department
Computer Information Systems
Academic Level
Undergraduate
Course Subject
Computer Information Systems
Course Number
296
Course Title
Information Assurance Methodology
Credit Hours
3.00
Instructor Contact Hours Per Semester
47.00 (for 15-week classes)
Student Contact Hours Per Semester
47.00 (for 15-week classes)
Grading Method
A-E
Pre-requisites
CRJ-131 and CIS-125 and CIS-280 and (CNT-110 OR CIS-112)
Catalog Course Description
A capstone course providing hands-on experiences in the planning, implementation, and maintenance of Information Security systems. Covers security technologies and tools, footprinting, scanning and enumeration, web browser security, access control, data management and recovery, log security issues, network intrusion detection systems, virtual private networks, encryption and malware prevention, and defense. Analyzes and implements information security techniques through laboratory exercises.
Goals, Topics, and Objectives
Core Course Topics
- Footprinting
- Scanning & Enumeration
- Windows OS Processes & Services
- Vulnerability Identification & Research Validation
- Vulnerability Validation
- System Remediation
- Windows Browser Security & Configuration
- Data Management
- Data Backup & Recovery
- Access Control
- Host IDS
- Log Security
- Windows Privacy & Anti-forensics Issues
- Software Firewalls
- Linksys Firewalls Router and Access Control Points
- Network IDS
- Network Traffic Analysis
- VPN and Remote Access
- Digital Certificates
- Password Circumvention
- Antivirus
- Malware Prevention
- Linux Labs
- Critical Thinking and Information Literacy in Information Assurance
Core Course Learning Objectives (Separated)
- Recognize and describe the clear distinction between the actions taken by an ethical information security professional as opposed to the activities of a computer hacker.
- Demonstrate knowledge and practice common tasks performed by Information Security (InfoSec) personnel in the course of their duties or career.
- Identify, practice (hands-on activities), and analyze common computer security technology systems (software and hardware).
- Identify and document security issue(s) of the Incident Response scenario presented by your Instructor.
- Analyze and document the security risks and vulnerabilities associated with the Security Incident Response scenario presented by your Instructor.
- Design a security solution detailing short and long term objectives to resolve the identified security issue(s).
- Evaluate and select security tools for the proposed security solution. Defend and document your security tool choices.
- Document the proposed security network architecture with diagrams, PowerPoint presentations, hardware equipment, software list, and a budget.
- Create new security policies required to support your security network architecture solution.
- Demonstrate design feasibility by implementing a prototype of the proposed security network architecture.
- Define the technical project plan and timeline for implementing your security network architecture solution.
- Analyze and document the security benefits, possible technical issues, and required resources needed to complete your project.
- Analyze and evaluate information in order to identify the need for research to draw conclusions, formulate inferences, solve problems and make decisions in the context of Computer Information Systems.
- Demonstrate information literacy by locating, evaluating, selecting, organizing, synthesizing, and ethically documenting information from multiple sources using both informal and formal formats, in the context of Computer Information Systems.
Assessment and Requirements
Assessment of Academic Achievement
- Assessment of student performance will be determined by lab assignments, examinations, Discussion Boards and a Documentation Binder with documentation and cited sources or references.
- All additional assessment of student achievement is left to the discretion of the instructor.
Outcomes
Satisfies Wellness Requirement
No
Effective Term
Fall 2024