Syllabus - Del Mar College



ITSY 2430 — Intrusion Detection

Del Mar College — Fall 2010

S Y L L A B U S

General Course Information

Instructor: Prof. Michael P. Harris, CCNA, CCAI

Office: VB114

Office Hours: MWF 9:00-10:00, TTh 2:00-3:00

Phone: (361) 698-1299

E-mail: mailto:mpharris@delmar.edu

Web site: academy.delmar.edu/Courses/ITSY2430

Classroom: VB177

Class Times: 12:00-1:50pm

Prerequisites: ITSY2400, ITSY2401

Textbook: Mark Ciampa, Security+ Guide to Network Security Fundamentals.

Course Technology Incorporated, 2009, ISBN 13: 978-1-4283-4066-4

Course Objectives

This course is a comprehensive guide for anyone wishing to take the CompTIA Security+ exam. The course covers all of the new CompTIA Security+ exam objectives and maps to the new Security+ 2008 exam. The course covers newly covered exam topics including cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Specific topic coverage includes:

• Introduction to Security

• System Threats and Risks

• Protecting Systems

• Network Vulnerabilities and Attacks

• Network Defenses

• Wireless Network Security

• Access Control Fundamentals

• Authentication

• Performing Vulnerability Assessments

• Conducting Security Audits

• Basic Cryptography

• Applying Cryptography

• Business Continuity Planning and Procedures

• Policies and Legislation

Web Site

Supplementary information for the course is available at: academy.delmar.edu/Courses/ITSY2430 The Web site contains class notes, Labs, Handouts, PowerPoint slides, class announcements, the course syllabus, test dates, and other information for the course.

E-Mail

All students are requested to obtain an e-mail account. If you have any questions about the course or need assistance, please contact me in person or by telephone during office hours; or by e-mail at any time. Also, you may submit the end-of-chapter case project assignments in class on the due date or by e-mail with a date stamp at or before 5:00 P.M. on the due date. E-mail submissions should be submitted as an attachment in Microsoft Word format.

14-Week Course Outline

|Week |Topics |Chapter |Exams |

| | |Readings | |

|1 |Introduction to Security |Chapter 1 | |

|2 |System Threats and Risks |Chapter 2 | |

|3 |Protecting Systems |Chapter 3 | |

|4 |Network Vulnerabilities and Attacks |Chapter 4 | |

|5 |Network Defenses |Chapter 5 | |

|6 |Wireless Network Security |Chapter 6 | |

|7 |Access Control Fundamentals |Chapter 7 |Mid-term Exam |

|8 |Authentication |Chapter 8 | |

|9 |Performing Vulnerability Assessments |Chapter 9 | |

|10 |Conducting Security Audits |Chapter 10 | |

|11 |Basic Cryptography |Chapter 11 | |

|12 |Applying Cryptography |Chapter 12 | |

|13 |Business Continuity |Chapter 13 | |

|14 |Security Policies and Training |Chapter 14 |Final Exam |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download