DEL MAR COLLEGECIS DEPARTMENT
I. ITSY 1300 Intro to Information Security (2-4-3)11.1003
Basic information security goals of availability, integrity, accuracy, and confidentiality. Vocabulary and terminology specific to the field of information security are discussed. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning and administrative controls is also discussed.
Course IDEA Objectives:
Essential:Gaining factual knowledge (terminology, classifications, methods, trends)
Important:Learning to apply course material (to improve thinking, problem solving, and decision.
Essential:Developing specific skills, competencies, and points of view needed by professionals in the field most closely related to this course.
SCANS (Secretary’s Commission on Achieving Necessary Skills) competencies are integrated into this course curriculum to improve education by helping to better define and assess the proficiency skills needed for employment. Each course competency will implement several SCANS to help you develop and reinforce employable skills. Competencies are criterion referenced (ie. They are measured against predetermined levels of proficiency in skills for effective job performance).
The know-how identified by SCANS is made up of five competencies and a three-part foundation of skills and personal qualities that are needed for solid job performance. These are:
WORKPLACE COMPETENCIES -- Effective workers can productively use:
Resources -- They know how to (C1) allocate time, (C2) money, ( C3) materials, and (C4) staff
Information --They can (C5) acquire and evaluate data, (C6) organize, and maintain files, (C7) interpret and communicate, and (C8) use computers to process information.
Interpersonal Skills -- They can work on (C9) teams, (C10) teach others, (C11) serve customers, (C12) lead, (C13) negotiate, and (C14) work well with people from culturally diverse backgrounds.
Systems -- They (C15) understand social, organizational, and technological systems; (C16) they can monitor and correct performance; and (17) they can design or improve systems.
Technology -- They can (C18) select equipment and tools, (C19) apply technology to specific tasks, and (C20) maintain and troubleshoot equipment.
Note: The subset C18, C19, and C20 are very important skills; however, these are not addressed in this course. These skills will be covered in further, technical courses
FOUNDATION SKILLS -- Competent workers in the high-performance workplace need:
Basic Skills-- (F1) reading, (F2) writing, (F3) arithmetic and (F4) mathematics, (F5) listening and (F6) speaking.
Thinking Skills-- (F7) to think creatively, (F8) to make decisions, (F9) to solve problems,
(F10) to visualize, (F11) the ability to learn, and (F12) to reason.
Personal Qualities --(F13) individual responsibility, (F14) self-esteem, (F15) sociability,
(F16) self-management, and (F17) integrity.
II. ITSY 1300 LEARNING OUTCOME--JOB SKILL:
- TheFoundational Material will cover the history, definition, and mission of computer security from a high level.
- The Specific Threats and Vulnerabilities section will perform a survey of common threats to information and information systems.
- The course will include a Survey of the Common Defensive Countermeasures wherein the students will participate in a high-level discussion of the defensive countermeasures currently in accepted best practice industrial use.
- The Intrusion Detection component will introduce the students to the concepts of logging, monitoring, and controlling applications.
- The Human Element of Security will introduce security policies, their implementation, and their acceptance by the people working under the policy.
- In the Remediation and Recovery block, the student will be exposed to industry best practices with respect to data back-up and archival, disaster recovery, business continuity planning, and insurance documentation.
- The Security Management block will explore management’s responsibilities as it applies to security policies, liability management, risk assessment, risk management.
- The class will discuss The Security and Privacy Requirements of Medical Records as mandated by The Health Insurance Portability and Accountability Act of 1996 (HIPAA).
- This course will emphasize a significant Ethical Foundation throughout the above topics stressing the moral basis of intellectual property, personal privacy, and an individual's responsibility for his or her actions particularly with respect to information.
To facilitate mastery of the above-listed competencies, the instructor will be responsible for:
1)gaining student's attention
2)informing student of objectives
3)stimulating recall of prior knowledge
4)presenting new material
5)providing guided practice
6)eliciting performance
7)providing feedback
8)assessing performance
9)enhancing retention and transfer of knowledge.
Evaluation:
To demonstrate mastery of the competencies listed above, the student will be responsible for:
1)Completing class assignments using instructional material and lecture notes.
2)Completing lab based Skills Bases Assessments.
3)Attending class and participating in the discussions.
III. ITSY 1300 LEARNING OUTCOME--subcategories of Major Themes:
PROFICIENCY LEVELS FOR SCANS COMPETENCIES:
1)Rarely performs task
2)Routinely performs task with moderate supervision
3)Routinely performs task with minimal supervision
4)Routinely performs task
5)Routinely performs task over and beyond designated task
III. Course Information:
Instructor:Prof. Michael P. Harris, CCNA, CCAI
Office: VB 114Computer Science Dept.
Phone: (361)698-1299Email:
The objective of this course is to develop in the student specific communications skills, competencies, and ethical points of view needed by professionals in the Information Security field. The course is intended to set the foundation for further study through reading, research, writing, and presenting security related topics. This course will emphasize breadth over depth in the subject matter. While some programming skills will be helpful to understanding the concepts, this course does not include a technical programming component or prerequisite.
Textbook: Computer Security Fundamentals,
Pearson/Prentice Hall, 2006 - Chuck Easttom
Class Structure: There will be a lecture/discussion portion and a presentation segment. I do not intend to read the textbook to you; therefore, please come to class having accomplished the assigned reading. We will begin each class with the Lecture/discussion for the days topic and this will usually be followed by a formal presentation/demonstration. The remainder of the class will be an open lab wherein I will be available to help with your labs, skills-based assessments, and research projects.
Examination & Grading Policy:
Unit Exams (2-3)60%
Homework Assignments (10-12)10%
Final Exam20%
Skills Bases Assessment ( Labs | Lab Exam ) 10%
Materials:(1) USB Flash Drive (64MB or larger) (for local removable storage for labs)
(2) CD-R -or- CD-RW (writeable or rewriteable blank CDROMs) w/cases
(1) Notebook to organize & maintain handouts, notes, exams, and lab work.
(2) Pens, Pencils, Paper, Highlighters, Term Paper presentation folders, Pocket folders for assignments, and other nominal supplies as can be expected for completion of a college course.
Maintaining email communication and assignment submission via email will be a major graded component of class attendance. Class attendance is mandatory. Absences totaling two class weeks is considered excessive and is grounds for being dropped from the course. No make-up tests will be given except in emergency situations. Students requesting disability accommodations or information are encouraged to contact the office of Special Services, located in the Harvin Center, 698-1298.
NOTE: If you have any questions about the content or grading of this course please ask them in class or during my office hours. Also note that the content, schedule, administration, and/or management of this course is subject to change without notice. The instructor reserves the right to modify this syllabus at any time. Additionally, all material discussed or shown in this course are for educational purposes only, and as such will only be used within the classroom for class related projects.
Course Outline:
Week 01 / IntroductionWeek 02 / Chapter 1. Introduction to Cyber Crime and Security
Week 03 / Chapter 2. Networks and the Internet
Week 04 / Chapter 3. Assessing a Target System
Week 05 / Chapter 4. Denial of Service Attacks
Week 06 / Unit Exam #1 -Chapters 1-4
Week 07 / Chapter 5. Malware
Week 08 / Chapter 6. Basics of Assessing and Securing a System
Week 09 / Chapter 7. Encryption
Week 10 / Chapter 8. Internet Fraud, and Cyber Crime
Week 11 / Unit Exam #2 -Chapters 5-8
Week 12 / Chapter 9. Industrial Espionage
Week 13 / Chapter 10. Cyber Terrorism and Information Warfare
Week 14 / Chapter 11. Cyber Detective
Week 15 / Chapter 12. Security Hardware and Software
Week 16 / Final Exam –Chapters 9-12
Del Mar College onlineStudent Resourcesand Student Informationhyperlinks:
Student Rights, Responsibilities & Safety | Standards of Conduct | Scholastic Dishonesty
Catalog & Student Handbook | Fall 2005 Semester Calendar | free Peer-Tutoring | Library Student Advising Handbook | Safety & Security | Computer/Network Use Policy | CS/IT
ITSY 1300 Intro to Information Security (2-4-3) 11.1003Page 1 of 5