CIS1350 Security Awareness and
CET1588C Network + or
CET1610C Router Protocols And Concepts
|Corequisites:||There are no corequisites for this course.|
|Catalog Description:||This course is intended to serve the needs of individuals interested in understanding the field of network security and how the field relates to other areas of Information Technology. The material in this course will provide the broad-based knowledge necessary to prepare students for further study in specialized security fields or may be used as a course for those interested in a general introduction to field network security. This course will also serve the needs of individuals seeking to pass the CompTIA Security+ certification exam.|
|Program Learning Outcomes:||
1. Security terminology and the goals of network security policies. 2. Basic operation of security authentication including Kerberos, CHAP, digital certificates, biometrics, tokens and mutual and multi-factor authentication. 3. Basic types of attacks and malicious code that commonly affect the confidentiality, integrity, and availability of networks. 4. Basic concepts and practices of remote access. 5. e-Mail vulnerabilities and how to safeguard against them. 6. Web security. 7. Enterprise directory services. 8. Vulnerabilities and safeguard for Wireless and Instant Messaging networks. 9. Proper use of networking devices and how to secure them. 10. Networking media. 11. Network topologies. 12. Intrusion Detection Systems. 13. Network Operating Systems vulnerabilities and safeguards. 14. Cryptography. 15. Physical Security. 16. Disaster Recovery and Business Continuity Planning. 17. Computer fraud; including ethics, investigation, and computer and network forensics.
|Course Learning Outcomes:||
1. The student will be able to describe the mechanisms and methods used to control what users can access, the extent of their capabilities after authentication and authorization, and auditing and monitoring or these activities. 2. The student will be able to identify internal, external, public and private communications systems; networking structures; protocols and remote access and administration. 3. The student will be able to identify company assets and the proper way to determine the necessary level of protection required. 4. The student will be able to identify the security components of Network Operating Systems and Applications. 5. The student will be able to discuss the differences between various cryptography techniques. 6. The student will be able to discuss the criteria used to evaluate “trusted systems”. 7. The student will analyze a scenario for Risk Assessment and Countermeasures. 8. The student will be able to discuss procedures used in “incident handling.” 9. The student will be able to identify and discuss the threats, risks and countermeasures to protect facilities, hardware, data, media, and personnel.
|Methods of Evaluation:||Evaluation of student progress towards achieving the stated learning outcomes and performance objectives is the responsibility of the instructor, within the policies of the college and the department. Detailed explanations are included in the expanded Syllabus developed by the instructor for each section being taught.|
|Flexibility:||It is the intention of the instructor to accomplish the objectives specified in the course syllabus. However, circumstances may arise which prohibit the fulfilling of this endeavor. Therefore, this syllabus is subject to change. When possible, students will be notified of any change in advance of its occurrence.|
|Student Email Accounts||Pensacola State College provides an institutional email account to all credit students. Pirate Mail is the official method of communication, and students must use Pirate Mail when communicating with the College. In cases where companion software is used for a particular class, emails may be exchanged between instructor and student using the companion software.|
|Note:||For students with a disability that falls under the Americans with Disability Act or Section 504 of the Rehabilitation Act, it is the responsibility of the student to notify Student Resource Center for ADA Services to discuss any special needs or equipment necessary to accomplish the requirements for this course. Upon completion of registration with the Student Resource Center for ADA Services office, specific arrangements can be discussed with the instructor.|