ITSY-1300 Fundamentals of Information Security: Cybersecurity


Amr Elchouemi

Credit Fall 2022


Section(s)

ITSY-1300-005 (49580)
LEC TuTh 9:00am - 10:20am DIL DLS DIL

LAB TuTh 10:20am - 10:45am DIL DLS DIL

Course Requirements

Grading Percentages: The following represents the breakout of assignments by percentage:

 

#

Item

points per one item

total points

percent of grade

4)

(15) Quizzes Ch 1 – 15

  20 points per quiz

300

10.0%

5)

(23) Simulation Labs Ch 1 – 15

  100 points per lab

2300

80.0%

6)

(1) Final assessment

 270 points

270

10.0%

 


Readings

Approved Course Texts/Readings:

 

CompTIA Security+ Guide to Network Security Fundamentals

By  Ciampa, Mark

Edition : 7TH 22

Publisher : CENGAGE L

ISBN 13 : 9780357424377

 

FIRST DAY ACCESS  All these course sections of ITSY-1300 includes a fee to cover the costs of required digital materials and/or an electronic textbook, provided at a discounted rate from the ACC Bookstore. IMPORTANT! The digital materials fee will be added to your tuition and fees when you register. You may choose to opt out of this fee and receive a refund if you wish to purchase the course materials separately.  Opt-out requests must be received prior to the official reporting date for a full refund.  For more information see austincc.edu/firstday.

 

Instructional Methodology:  This course will have 75% lecture and 25% laboratory.   The CIS open labs are available for students for work outside of scheduled lab time.  

 

 


Course Subjects

ITSY 1300 – COURSE SCHEDULE 16 Weeks

 

Week

Lecture

Laboratory Activities/Projects

Concept Quiz (CQ)

 

Due Date

1

Chapter 1

2 Simulation Labs

1 Quiz

8/28/2021

2

Chapter 2

1 Simulation Lab

1 Quiz

9/4/2021

 

3

Chapter 3

1 Simulation Lab

1 Quiz

9/11/2021

4

Chapter 4

2 Simulation Labs

1 Quiz

9/18/2021

5

Chapter 5

2 Simulation Labs

1 Quiz

9/25/2021

6

Chapter 6

2 Simulation Labs

1 Quiz

10/2/2021

7

Chapter 7

1 Simulation Lab

1 Quiz

10/9/2021

8

Chapter 8

1 Simulation Lab

1 Quiz

10/16/2021

9

Chapter 9

2 Simulation Labs

1 Quiz

10/23/2021

10

Chapter 10

2 Simulation Labs

1 Quiz

10/30/2021

11

Chapter 11

1 Simulation Lab

1 Quiz

11/6/2021

12

Chapter 12

1 Simulation Lab

1 Quiz

11/13/2021

13

Chapter 13

2 Simulation Labs

1 Quiz

11/20/2021

14

Chapter 14

2 Simulation Labs

1 Quiz

11/27/2021

15

Chapter 15

1 Simulation Lab

1 Quiz

12/4/2021

16

Final Assessment

CompTIA Security+ SYO-601 Post-Assessment Quiz

12/11/2021

(*) This syllabus is intended to give the student guidance in what MAY be covered during the semester and will be followed as closely as possible. However, the professor reserves the right to modify, supplement and make changes as the course needs arise.

 


Student Learning Outcomes/Learning Objectives

Course Description: Basic information security goals of availability, integrity, accuracy, and confidentiality. Vocabulary and terminology specific to the field of information security are discussed. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning and administrative controls is also discussed. Additional topics include instruction in security for network hardware, software, and data including physical security, backup procedures, firewalls, encryption, and protection from viruses. 

 

Pre-requisite:  Although there are no prerequisites for this course, it is suggested that you take Fundamentals of Networking Technologies prior to or in the same semester as Fundamentals of Information Security.

 

Course Rationale To introduce students to a broad range of network security-related topics including confidentiality, integrity, authentication, and non-repudiation. In addition, students will study elements of security for network hardware, software and data including physical security, encryption, protection from viruses and attacks.

 

Course Objectives / Learning Outcomes:  

  1. Gather and document security requirements
  2. Design and document security plan
  3. Develop data/information assurance plans and implementation strategies
  4. Identify, analyze, and evaluate infrastructure and network vulnerabilities
  5. Identify and assess current and anticipated security risks and vulnerabilities
  6. Gather data and analyze security requirements
  7. Monitor performance to ensure integrity and confidentiality
  8. Perform research and analyze requirements
  9. Monitor, evaluate, and test security conditions and environment
  10. Incorporate security requirements into design
  11. Implement and enforce system and user security requirements
  12. Implement, enforce, and monitor security policies, practices, and procedures

Office Hours

M W 1:00 PM - 2:00 PM online

NOTE You can arrange with me if you want to meet outside these hours

Published: 08/17/2022 15:37:15