ITSY-1300 Fundamentals of Information Security: Cybersecurity
Amr Elchouemi
Credit Fall 2022
Section(s)
ITSY-1300-005 (49580)
LEC TuTh 9:00am - 10:20am DIL DLS DIL
LAB TuTh 10:20am - 10:45am DIL DLS DIL
Course Requirements
Grading Percentages: The following represents the breakout of assignments by percentage:
# |
Item |
points per one item |
total points |
percent of grade |
4) |
(15) Quizzes Ch 1 – 15 |
20 points per quiz |
300 |
10.0% |
5) |
(23) Simulation Labs Ch 1 – 15 |
100 points per lab |
2300 |
80.0% |
6) |
(1) Final assessment |
270 points |
270 |
10.0% |
Readings
Approved Course Texts/Readings:
CompTIA Security+ Guide to Network Security Fundamentals
By Ciampa, Mark
Edition : 7TH 22
Publisher : CENGAGE L
ISBN 13 : 9780357424377
FIRST DAY ACCESS All these course sections of ITSY-1300 includes a fee to cover the costs of required digital materials and/or an electronic textbook, provided at a discounted rate from the ACC Bookstore. IMPORTANT! The digital materials fee will be added to your tuition and fees when you register. You may choose to opt out of this fee and receive a refund if you wish to purchase the course materials separately. Opt-out requests must be received prior to the official reporting date for a full refund. For more information see austincc.edu/firstday.
Instructional Methodology: This course will have 75% lecture and 25% laboratory. The CIS open labs are available for students for work outside of scheduled lab time.
Course Subjects
ITSY 1300 – COURSE SCHEDULE 16 Weeks
Week |
Lecture |
Laboratory Activities/Projects Concept Quiz (CQ) |
Due Date |
1 |
Chapter 1 |
2 Simulation Labs 1 Quiz |
8/28/2021 |
2 |
Chapter 2 |
1 Simulation Lab 1 Quiz |
9/4/2021
|
3 |
Chapter 3 |
1 Simulation Lab 1 Quiz |
9/11/2021 |
4 |
Chapter 4 |
2 Simulation Labs 1 Quiz |
9/18/2021 |
5 |
Chapter 5 |
2 Simulation Labs 1 Quiz |
9/25/2021 |
6 |
Chapter 6 |
2 Simulation Labs 1 Quiz |
10/2/2021 |
7 |
Chapter 7 |
1 Simulation Lab 1 Quiz |
10/9/2021 |
8 |
Chapter 8 |
1 Simulation Lab 1 Quiz |
10/16/2021 |
9 |
Chapter 9 |
2 Simulation Labs 1 Quiz |
10/23/2021 |
10 |
Chapter 10 |
2 Simulation Labs 1 Quiz |
10/30/2021 |
11 |
Chapter 11 |
1 Simulation Lab 1 Quiz |
11/6/2021 |
12 |
Chapter 12 |
1 Simulation Lab 1 Quiz |
11/13/2021 |
13 |
Chapter 13 |
2 Simulation Labs 1 Quiz |
11/20/2021 |
14 |
Chapter 14 |
2 Simulation Labs 1 Quiz |
11/27/2021 |
15 |
Chapter 15 |
1 Simulation Lab 1 Quiz |
12/4/2021 |
16 |
Final Assessment |
CompTIA Security+ SYO-601 Post-Assessment Quiz |
12/11/2021 |
(*) This syllabus is intended to give the student guidance in what MAY be covered during the semester and will be followed as closely as possible. However, the professor reserves the right to modify, supplement and make changes as the course needs arise.
Student Learning Outcomes/Learning Objectives
Course Description: Basic information security goals of availability, integrity, accuracy, and confidentiality. Vocabulary and terminology specific to the field of information security are discussed. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning and administrative controls is also discussed. Additional topics include instruction in security for network hardware, software, and data including physical security, backup procedures, firewalls, encryption, and protection from viruses.
Pre-requisite: Although there are no prerequisites for this course, it is suggested that you take Fundamentals of Networking Technologies prior to or in the same semester as Fundamentals of Information Security.
Course Rationale To introduce students to a broad range of network security-related topics including confidentiality, integrity, authentication, and non-repudiation. In addition, students will study elements of security for network hardware, software and data including physical security, encryption, protection from viruses and attacks.
Course Objectives / Learning Outcomes:
- Gather and document security requirements
- Design and document security plan
- Develop data/information assurance plans and implementation strategies
- Identify, analyze, and evaluate infrastructure and network vulnerabilities
- Identify and assess current and anticipated security risks and vulnerabilities
- Gather data and analyze security requirements
- Monitor performance to ensure integrity and confidentiality
- Perform research and analyze requirements
- Monitor, evaluate, and test security conditions and environment
- Incorporate security requirements into design
- Implement and enforce system and user security requirements
- Implement, enforce, and monitor security policies, practices, and procedures
Office Hours
M W 1:00 PM - 2:00 PM online
NOTE You can arrange with me if you want to meet outside these hoursPublished: 08/17/2022 15:37:15