CIS-296: Information Assurance Methodology

School
Business, Entrepreneurship, and Professional Development
Division
Computer Technology
Department
Computer Information Systems
Academic Level
Undergraduate
Course Subject
Computer Information Systems
Course Number
296
Course Title
Information Assurance Methodology
Credit Hours
3.00
Instructor Contact Hours Per Semester
47.00 (for 15-week classes)
Student Contact Hours Per Semester
47.00 (for 15-week classes)
Grading Method
A-E
Pre-requisites
CRJ-131 and CIS-125 and CIS-280 and (CNT-110 OR CIS-112)
Catalog Course Description

A capstone course providing hands-on experiences in the planning, implementation, and maintenance of Information Security systems. Covers security technologies and tools, footprinting, scanning and enumeration, web browser security, access control, data management and recovery, log security issues, network intrusion detection systems, virtual private networks, encryption and malware prevention, and defense. Analyzes and implements information security techniques through laboratory exercises.

Goals, Topics, and Objectives

Core Course Topics
  1. Footprinting
  2. Scanning & Enumeration
  3. Windows OS Processes & Services
  4. Vulnerability Identification & Research Validation
  5. Vulnerability Validation
  6. System Remediation
  7. Windows Browser Security & Configuration
  8. Data Management
  9. Data Backup & Recovery
  10. Access Control
  11. Host IDS
  12. Log Security
  13. Windows Privacy & Anti-forensics Issues
  14. Software Firewalls
  15. Linksys Firewalls Router and Access Control Points
  16. Network IDS
  17. Network Traffic Analysis
  18. VPN and Remote Access
  19. Digital Certificates
  20. Password Circumvention
  21. Antivirus
  22. Malware Prevention
  23. Linux Labs
  24. Critical Thinking and Information Literacy in Information Assurance
Core Course Learning Objectives (Separated)
  1. Recognize and describe the clear distinction between the actions taken by an ethical information security professional as opposed to the activities of a computer hacker.
  2. Demonstrate knowledge and practice common tasks performed by Information Security (InfoSec) personnel in the course of their duties or career.
  3. Identify, practice (hands-on activities), and analyze common computer security technology systems (software and hardware).
  4. Identify and document security issue(s) of the Incident Response scenario presented by your Instructor.
  5. Analyze and document the security risks and vulnerabilities associated with the Security Incident Response scenario presented by your Instructor.
  6. Design a security solution detailing short and long term objectives to resolve the identified security issue(s).
  7. Evaluate and select security tools for the proposed security solution. Defend and document your security tool choices.
  8. Document the proposed security network architecture with diagrams, PowerPoint presentations, hardware equipment, software list, and a budget.
  9. Create new security policies required to support your security network architecture solution.
  10. Demonstrate design feasibility by implementing a prototype of the proposed security network architecture.
  11. Define the technical project plan and timeline for implementing your security network architecture solution.
  12. Analyze and document the security benefits, possible technical issues, and required resources needed to complete your project.
  13. Analyze and evaluate information in order to identify the need for research to draw conclusions, formulate inferences, solve problems and make decisions in the context of Computer Information Systems.
  14. Demonstrate information literacy by locating, evaluating, selecting, organizing, synthesizing, and ethically documenting information from multiple sources using both informal and formal formats, in the context of Computer Information Systems.

Assessment and Requirements

Assessment of Academic Achievement
  • Assessment of student performance will be determined by lab assignments, examinations, Discussion Boards and a Documentation Binder with documentation and cited sources or references.
  • All additional assessment of student achievement is left to the discretion of the instructor.

Outcomes

Satisfies Wellness Requirement
No

Approval Dates

Effective Term
Fall 2024
ILT Approval Date
AALC Approval Date
Curriculum Committee Approval Date
Review Semester
Fall 2024