Central Texas College



| | |

| | |

| |SYLLABUS FOR HMSY 1370 |

| |Information Technology Security for Homeland Security Specialists |

| |WeBB Learning |

| |Semester Hours Credit: 3 |

| |Lecture Hours: 48 |

| | |

| |Course Dates: 8/1/2016-9/11/2016 |

| |Weekly CTC Blackboard discussions and lessons |

| |Instructor: Dianne Fonseca Diaz |

| |Instructor’s Location: WeBB Learning |

| |Skype Name: dianne.fonsecadiaz |

| |Weekly Skype Office Hours: (Tue & Thu from 8pm to 10pm GMT+2) |

| |Instructor Email: dianne.fonsecadiaz.ctc@ |

| |Magic Jack Phone: (954) 278-7527 |

| | |

INSTRUCTOR BIOGRAPHY

Welcome to HMSY 1370! I am Mrs. Dianne Fonseca Diaz and I will be your instructor throughout this course. I have been stationed in Illesheim Germany since 2002. I was prior military here in Illesheim as a 94R (Avionics System Repairer). I currently work as a government employee at the Flight Simulator as a Lead Quality Assurance Specialist. As part of my job, I maintain the network as a System Admin\Network Admin\IMO.

I currently have a B.S. in Computer Science from Bellevue University, 33 credits towards a Master of Science in Management from Embry Riddle Aeronautical University, a Graduate Certificate in Information Security / Assurance and Digital Forensics and a Master’s Degree Information Security / Assurance and Digital Forensics with Trident. I currently hold IT certifications such as Security+, Windows 7 and military courses to include DOD Information Assurance Certification and Accreditation Process (DIACAP), OU Administrator, SharePoint, Certified Information Security Manager (CISM), Information Management Officer (IMO), Certified Authorization Professional (CAP), Cisco Certified Network Associate (CCNA) and CompTIA Advanced Security Practitioner (CASP).

Please make sure you read the course syllabus, learning outcomes, instructional materials and course requirements carefully when it comes to general instructions about the assignments, exams and the discussion forum. Please note that discussion board participation is part of your final grade. Please make sure that your postings offer insightful comments, and supporting citations. If you have any questions regarding this course, I will be glad to clarify it. I look forward to assist you achieve your educational goals.

I. INTRODUCTION

A. Introduction to Cyber-Terrorism: is the study of the basics in cyber security with an understanding on how to protect data and infrastructure from the ravages of cyber-crimes and electronic terrorism. Topics include desktop computer security, organizational security, communication security, and network security. The course examines applications with proven success and ties them to real-life scenarios.

B. This course is a required course in the Homeland Security—Emergency Management Degree Plan.

C. This course is occupationally related and serves a preparation for careers in Homeland Security.

D. Prerequisite(s): None

AI. LEARNING OUTCOMES

Upon successful completion of this course, Information Technology Security, the student will:

A. Provide students with a comprehensive overview of security challenges

B. Provide students with a understanding of domestic and international terrorism

C. Provide steps in a comprehensive defense strategy

D. Develop students' abilities to effectively communicate on security issues in verbal and written formats

III. INSTRUCTIONAL MATERIALS

A. The instructional materials identified for this course are viewable through



Required Student Textbook:

Ciampa, Mark (2014). Security Awareness: Applying Practical Security in Your World, 4th Edition. (4th ed.) Publisher Name: Course Technology

ISBN: 10: 1-111-64418-7

ISBN: 13: 978-1-111-64418-5

IV. COURSE REQUIREMENTS

A. Your first responsibility is scholarship. The grade you receive for this course will not be the grade of the instructor, but rather the grade you and you alone make.

B. You should attend all online Central Texas College (CTC) Blackboard sessions each week, along with any instructor-required live sessions on Skype, Blackboard Collaborate, Google+, FaceTime, etc. Be prepared to also take any unannounced quizzes relating to text assignments and lecture material presented from the beginning of the course. Please refer to ‘Class Attendance and Course Progress’ under the Academic Policies section in our current CTC Course Catalog.

C. You are encouraged to give your best effort throughout the course. From the beginning, you should plan for a steady, organized, and continuous effort, which in the long run will prove more effective for your final grade than a last minute crash-cram policy. Your course grade is not determined solely by exam grade. Such factors as class participation, initiative, attendance, and individual research papers or projects will be considered in grade computation.

D. From time to time, special library and/or outside assignments will be made to members of the class individually and/or in groups. You are expected to read all assignments and fulfill your responsibilities to any group assignment.

E. You are expected to read all assigned material and bring your textbook/reading materials to class. Keep informed on all assignments, especially after an absence.

F. Good class notes are indispensable for earning a good grade, since both the material assigned and that discussed in class will be the basis for examination material.

G. Scholastic Honesty: All students are required and expected to maintain the highest standards of scholastic honesty in the preparation of all coursework and during examinations. The following are considered examples of scholastic dishonesty:

Plagiarism: The taking of passages from the writing of others without giving proper credit to the sources.

Collusion: Using another’s work as one’s own, or working together with another person in the preparation of work, unless such joint preparation is specifically approved in advance by the instructor.

Cheating: Giving or receiving information on examinations.

Students guilty of scholastic dishonesty will be administratively dropped from the course with a grade of “F” and be subject to disciplinary action, which may include suspension and expulsion.

H. Special Work: A term paper or other project, per requirements of the instructor, will be required. The subject must be appropriate for the course material. Check with the instructor when you have made a selection. The value is indicated in the semester grade computation and has considerable weight on your final average.

V. COURSE FORMAT – WeBB Learning on Blackboard

This course has been developed on Blackboard.  It is the student’s responsibility to make sure that they have access to CTC Blackboard and that they are familiar with the contents and assignments. It is also the student’s responsibility to log into CTC Blackboard at least once a week to ‘attend’ the online class portion and to participate in the online Blackboard streaming sessions, discussions, and assignments. Failure to do so will violate the attendance policy and will have a negative impact on the course grade.

The course will meet for six weeks. Instructional strategies will include weekly CTC Blackboard assignments, discussion boards, and streaming sessions to accomplish the lecture hours per week. Weekly interactions will be available via various communication tools to include Skype, Blackboard Collaborate, or Voice Podcaster/Voice Email, and conventional use of emails and Blackboard Message Board. Students may be assigned to participate in Groups, Journals, Blogs, or Wikis.  Students will also have an access to required Discussion Board threads; course Announcements; critiques and feedback on Assignments and drafts of papers. Specific weekly interaction will be communicated via Announcements on Blackboard and arranged with the course instructors.

VI. EXAMINATIONS

A. There will be a minimum of two major examinations and two written papers as follows:

1. Mid-term exam is due on 08/21/2016

2. Final exam is due on 09/11/2016

3. Research Paper 1 due on 08/21/2016

4. Research Paper 2 due on 09/11/2016

Each student is required to write a 3 to 4 pages double-spaced excluding the cover page and reference list page. Research topic can be found under the Research Paper 1 & 2 link. Student must use in-text citations of sources, proper format for quotations, and correctly format full source information in the reference list using MLA style. Students will be graded on content and formatting. Wikipedia citation will not be accepted and will cause an automatic zero on this assignment. Research paper must include at least one outside source other than the course materials. For more information on MLA style, go to the CTC library website at: or

B.      A student must be present for all examinations.  Students who know in advance that they will be absent from an examination due to valid reasons must arrange to take an early examination.  Unexpected absences due to illness or extenuating circumstances will require the student to see the instructor about individual make-up work.

C.      Students without excused absences will be given a zero for the missed examination.

D. Examinations will consist of both objective (true/false, multiple choice, fill in-the-blank, and matching) and subjective (short answer and essay) questions. Students must be able to communicate both orally and in written form, thus some questions requiring the composition and writing of an essay answer will be required.

E. Exams will be administered via BioSig application. See Blackboard class for registration information.

VII. SEMESTER GRADE COMPUTATION

The final grade in this course will be based on the following:

Discussion Board (mandatory) 100 points

Assignments 100 points

Lesson Quizzes 100 points

Research Papers 200 points

Mid-term Exam 200 points

Final Exam 300 points

Total possible points: 1000 points

POINTS GRADES

900-1000 A=4 pts/sem hr

800-899 B=3 pts/sem hr

700-799 C=2 pts/sem hr

600-699 D=1 pt/sem hr

0-599 F=0 pts/sem hr

A term paper or term project is expected from all students. Students may vary in their competency levels on these abilities, so the instructor may need to revisit the term paper concept during the course.

VIII. NOTES AND ADDITIONAL INSTRUCTIONS FROM THE INSTRUCTOR

A. Tuition refunds are made only in the case of class cancellation or official and timely withdrawal from CTC or from a course. Please refer to the current course catalog for more details.

B. GoArmyEd students should contact their education counselor before withdrawing and are required to withdraw through the GoArmyEd portal.

Please note: a military withdrawal does not override CTC’s grading policy.

For self-pay students, refunds are computed from the date the Application for

0. Withdrawal or Refund is filed with the CTC Field Representative or designated student Services Officer. Special conditions apply to students who receive federal, state, and/or institutional financial aid.

Tuition and fees paid directly to the Institution by the Veterans Administration, Title IV (Financial Aid Programs, a sponsor, donor, or scholarship shall be refunded to the source rather than directly to the students.

C. Course Withdrawals, Student Responsibilities: It is the student’s responsibility to officially withdraw from a course. The instructor cannot initiate a withdrawal based upon a student’s request. Rather, students must initiate the withdrawal with the designated Education Center Representative, through the CTC Field Representative or the Student Services Officer for that region.

Applications for Withdrawal will be accepted at any time before the completion of 75% of the course, after which time the student will be assigned an “FN”- “Failure for Non-attendance.”

D. Faculty/Administrative Initiated Withdrawals

Faculty are authorized to withdraw students who are not making satisfactory course progress as outlined in the section of the Catalog entitled "Satisfactory Progress Standards”.

A student may be administratively withdrawn by a designated member of the administrative staff of the College under the following conditions:

• The student has been placed on Academic Suspension or Disciplinary Suspension;

• The student has an outstanding financial obligation owed to the college;

• The student registered for a course without the required prerequisite or departmental permission;

• Students who do not participate or complete graded activities during the first week will be administratively withdrawn.

The college is under no obligation to refund tuition and fees, or other costs associated with a student who is administratively withdrawn.

E. Incomplete / Course in Progress Grade Policy: An “IP” or “Incomplete” grade may be assigned by an instructor if a student has made satisfactory progress in a course with the exception of a major quiz, final exam, or other project. The “IP” grade may also be assigned based on circumstances beyond a student’s control, such as personal illness, death in the immediate family, or military orders. Notice of absences, with supporting documentation, may be required by the instructor. The instructor makes the final decision concerning the granting of the incomplete grade. With an “Incomplete” grade, students are required to complete a set amount of work before the instructor will submit an official letter grade.

F. Cellular phones, beepers, and other electronic devices will be turned off while the student is in the classroom or laboratory unless the student is using the device for class purposes. No texting or social networking is allowed during class.

G. Instructor Discretion: The instructor reserves the right of final decision in course requirements.

H. Civility: Individuals are expected to be cognizant of what a constructive educational experience is and respectful of those participating in a learning environment. Failure to do so can result in disciplinary action up to and including expulsion.

IX. COURSE OUTLINE

Note: The instructor has the right to change the course schedule and will announce any changes in class.

Assignments and interaction are via CTC Blackboard. It is the student’s responsibility to make sure that they have access to internet so that they may communicate, via CTC Blackboard, with the instructor. The class is broken down into six sessions. This is not a self-paced class. Please take note of the deadlines.

Sessions - (08/01/20016-09/11/2016)

a) CTC Blackboard Discussion Board initial posts are due by Thursday at midnight (Instructor’s Time Zone)

1. CTC Blackboard peer response to Discussion Board posts is due by Sunday midnight (Instructor’s Time Zone)

b) CTC Blackboard assignment/project is due Sunday midnight (Instructor’s Time Zone)

1. Mid-term exam on 08/21//2016

2. Research Paper 1 due on 08/21/2016

3. Final exam on 09/11/2016

4. Research Paper 2 due on 09/11/2016

6-Week Course Schedule

|Week |Topics |Chapter |Exams | | |

| | |Readings | |Online Discussion Dates and Due | |

| | | | |Dates | |

| | | | | | |

| | | | | | |

|1 |Introduction to Security |Chapter 1 | |1-7 August | |

|2 |Desktop Security |Chapter 2 | |8-14 August | |

|3 |Internet Security |Chapter 3 | |15-21 August | |

| |Research Paper 1 Due | |Mid-term Exam |15-21 August | |

| | | | |21 August | |

|4 |Personal Security |Chapter 4 | |22-28 August | |

|5 |Wireless Network Security |Chapter 5 | |29-4 September | |

|6 |Enterprise Security |Chapter 6 | |5-11 September | |

| |Research Paper 2 Due | |Final Exam |5-11 September | |

| | | | |11 September | |

* Initial discussion board postings are due on Thursday at midnight of each week. Peer to peer responses are every Sunday by midnight.

A. Chapter 1

Chapter 1 introduces several security concepts including the difficulties of creating a secure computer system or network, the types of attacks and attackers, and the principles of good defense. In this chapter students will learn terminology related to computer security and the basic steps of an attack. The final section focuses on how to defend against attacks.

1. Objectives

Upon successful completion of this chapter, the student will be able to:

a. Describe the challenges of securing information

b. Define information security and explain why it is important

c. Identify the types of attackers that are common today

d. List the basic steps of an attack

e. Describe the steps in a defense and a comprehensive defense strategy

2. Learning Activities

a. Describe the challenges of securing information

b. Define information security and explain why it is important

c. Identify the types of attackers that are common today

d. List the basic steps of an attack

e. Describe the steps in a defense and a comprehensive defense strategy

3. Lesson Outcome

a. Understand the challenges of securing information

b. Understand information security and explain why it is important

c. Understand the types of attackers that are common today

d. Understand the basic steps of an attack

e. Understand the steps in a defense and a comprehensive defense strategy

B. Chapter 2

Chapter 2 covers the different threats to desktop systems and how to protect against them. Students will learn about the different types of infecting and concealing malware. Then they will learn about hardware attacks. Desktop defenses such as antivirus software and physical theft prevention devices are covered.

The chapter concludes with a brief description of how to recover from an attack.

1. Objectives

Upon successful completion of this chapter, the student will be able to:

a. Describe the different types of hardware and software attacks

b. List types of desktop defenses

c. Explain how to recover from an attack

2. Learning Activities

a. Describe the different types of hardware and software attacks

b. List types of desktop defenses

c. Explain how to recover from an attack

3. Lesson Outcome

a. Understand the different types of hardware and software attacks

b. Understand the types of desktop defenses

c. Understand how to recover from an attack

C. Chapter 3

Chapter 3 covers the topic of Internet security. The chapter begins with an overview of the World Wide Web and e-mail covering the ways that information is sent from one computer to another. The second section of the chapter focuses on the different types of security and privacy vulnerabilities present in using the Internet. The final section presents an overview of how to protect against Internet-based attacks.

1. Objectives

Upon successful completion of this chapter, the student will be able to:

a. Explain how the World Wide Web and e-mail work

b. List the different types of Internet attacks

c. Explain the defenses used to repel Internet attacks

2. Learning Activities

a. Explain how the World Wide Web and e-mail work

b. List the different types of Internet attacks

c. Explain the defenses used to repel Internet attacks

3. Lesson Outcome

a. Understand how the World Wide Web and e-mail work

b. Understand the different types of Internet attacks

c. Understand the defenses used to repel Internet attacks

D. Chapter 4

Chapter 4 covers the security of personal information. The chapter begins with an overview of the various types of threads including spyware, password attacks, social networking attacks, phishing, and identity theft. The chapter concludes with information on fighting each type of attack and an additional section on understanding and using cryptography.

1. Objectives

Upon successful completion of this chapter, the student will be able to:

a. Describe attacks on personal security

b. Explain the dangers of identity theft

c. List the defenses against personal security attacks

d. Define cryptography and explain how it can be used

2. Learning Activities

a. Describe attacks on personal security

b. Explain the dangers of identity theft

c. List the defenses against personal security attacks

d. Define cryptography and explain how it can be used

3. Lesson Outcome

a. Understand attacks on personal security

b. Understand the dangers of identity theft

c. Understand the defenses against personal security attacks

d. Understand cryptography and explain how it can be used

E. Chapter 5

Chapter 5 begins with an overview of wireless networking. Students will learn about the required hardware components for building a wireless network and about the communication protocols used by this type of network. The second section focuses on the different types of attacks that can be launched on a wireless network. The third section explains how to defend against these attacks.

1. Objectives

Upon successful completion of this chapter, the student will be able to:

a. Explain what a network is and the different types of networks

b. List the different attacks that can be launched against a wireless network

c. Give the steps necessary to secure a wireless network

2. Learning Activities

a. Explain what a network is and the different types of networks

b. List the different attacks that can be launched against a wireless network

c. Give the steps necessary to secure a wireless network

3. Lesson Outcomes

a. Understand what a network is and the different types of networks

b. Understand the different attacks that can be launched against a wireless network

c. Understand the steps necessary to secure a wireless network

F. Chapter 6

In Chapter 6 students will learn about two major areas of enterprise security: redundancy planning and security policies. Redundancy planning involves making sure that there is back up information, power, and physical sites from which a business can continue to operate in the event of a disaster. A security policy is a written document that describes the security operations for an organization. It may be divided into several parts relating to various aspects of security, several of which are covered in the chapter.

1. Objectives

Upon successful completion of this chapter, the student will be able to: a. Define business continuity

b. Explain how redundancy planning and disaster recovery planning benefit an organization

c. Explain what a policy is and how it is used

d. List the different types of security policies

2. Learning Activities

a. Define business continuity

b. Explain how redundancy planning and disaster recovery planning benefit an organization

c. Explain what a policy is and how it is used

e. List the different types of security policies

3. Learning Outcomes

a. Understand business continuity

b. Understand how redundancy planning and disaster recovery planning benefit an organization

c. Explain what a policy is and how it is used

d. List the different types of security policies

-----------------------

[pic]

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download