ITSY-1300 Fundamentals of Information Security: Cybersecurity


Ola Jobi

Credit Fall 2024


Section(s)

ITSY-1300-009 (91212)
LEC Tu 6:00pm - 8:35pm RRC RRC2 2207.00

LAB Tu 8:35pm - 9:30pm RRC RRC2 2207.00

Course Requirements

Basic information security goals of availability, integrity, accuracy, and confidentiality.

Vocabulary and terminology specific to the field of information security are discussed.

Identification of exposures and vulnerabilities and appropriate countermeasures are

addressed. The importance of appropriate planning and administrative controls is also

discussed. Additional topics include: instruction in security for network hardware, software,

and data including physical security, backup procedures, firewalls, encryption, and protection

from viruses.


Readings

Text & Lab Manual:    CompTIA Security+ Guide to Network Security Fundamentals

By  Ciampa, Mark

Edition : 7TH 22

Publisher : CENGAGE L

ISBN 13 : 9780357424377

 


Course Subjects

Specific topic coverage includes:

  • Security Fundamentals

    Threat Management and Cybersecurity Resources

     

    Threats and Attacks on Endpoints

    Endpoint and Application Development Security

    Mobile, Embedded, and Specialized Device Security

    Cryptography

     

    Public Key Infrastructure and Cryptographic Protocols

    Networking Threats, Assessments, and Defenses

    Network Security Appliances and Technologies

    Cloud and Virtualization Security

    Wireless Network Security

    Authentication

    Incident Preparation, Response, and Investigation

     

    Cybersecurity Resilience

     

     Risk Management and Data Privacy

 


Student Learning Outcomes/Learning Objectives

 

At the completion of this course, the student will have demonstrated the ability to:

 

  1. Competency #1: (1,2,3,4,5)

Information Security is Important

A Global Roadmap for Security / Tailoring A Solution that Fits

Defining Company’s Executive Roles

Defining Company Functional Security Role

 

  1. Competency 2: (6,7,8,9,10)

Defining the Corollary Roles for Security Roles

The Data Security Competency

The Digital Forensics Competency

The Enterprise Continuity Competency

The Incidence Management Competency

 

  1. Competency 3: (11,12,13,14,15)

IT Security Training and Awareness

Securing the IT Systems Operations and Maintenance Function

Network and Telecommunication Security

Personnel Security

Physical Security

 

4. Competency 4: (16,17,18,19,20)

Procurement

Legal Regulatory Compliance

The Risk Management Competency

Strategic Management

System and Application Security


Office Hours

M 8:30 PM - 9:00 PM Online

NOTE

Published: 09/15/2024 20:04:05