Faculty Syllabus

ITSY-1300 Fundamentals of Information Security: Cybersecurity


James Webb


Credit Spring 2026


Section(s)

ITSY-1300-009 (17436)
LEC MW 11:00am - 12:20pm RRC RRC2 2207.00

LAB MW 12:20pm - 12:45pm RRC RRC2 2207.00

Course Requirements

Course Requirements

  • Credit Hours: 3
  • Classroom Contact Hours per week: 2hrs 40mins
  • Laboratory Contact Hours per week: 50mins

Course Description: Basic information security goals of availability, integrity, accuracy, and confidentiality. Vocabulary and terminology specific to the field of information security are discussed. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning and administrative controls is also discussed. Additional topics include: instruction in security for network hardware, software, and data including physical security, backup procedures, firewalls, encryption, and protection from viruses.

Pre-requisite:  Although there are no prerequisites for this course, it is suggested that you take Fundamentals of Networking Technologies prior to or in the same semester as Fundamentals of Information Security.

Course Rationale To introduce students to a broad range of network security-related topics including: confidentiality, integrity, authentication, and non-repudiation. In addition, students will study elements of security for network hardware, software and data including physical security, encryption, protection from viruses and attacks.

 

 


Readings

Approved Course Texts/Readings:

CompTIA Security+ Guide to Network Security Fundamentals

By Ciampa, Mark

Edition : 7TH 22

Publisher: CENGAGE L

ISBN 13: 9780357424377

This course is a First Day course which means your digital book is included as part of your tuition and there is no additional purchase required.


Course Subjects

Introduction to Security

Threat Management and Cybersecurity Resources

Threats and Attacks on Endpoints

Endpoint and Application Development Security

Mobile, Embedded, and Specialized Device Security

Basic Cryptography

Public Key Infrastructure and Cryptographic Protocols

Networking Threats, Assessments, and Defenses

Network Security Appliances and Technologies

Cloud and Virtualization Security

Wireless Network Security

Authentication

Incident Preparation, Response, and Investigation

Cybersecurity Resilience

Risk Management and Data Privacy


Student Learning Outcomes/Learning Objectives

Course Objectives / Learning Outcomes: 

  1. Gather and document security requirements
  2. Design and document security plan
  3. Develop data/information assurance plans and implementation strategies
  4. Identify, analyze, and evaluate infrastructure and network vulnerabilities
  5. Identify and assess current and anticipated security risks and vulnerabilities
  6. Gather data and analyze security requirements
  7. Monitor performance to ensure integrity and confidentiality
  8. Perform research and analyze requirements
  9. Monitor, evaluate, and test security conditions and environment
  10. Incorporate security requirements into design
  11. Implement and enforce system and user security requirements
  12. Implement, enforce, and monitor security policies, practices, and procedures

SCANS (Secretary’s Commission on Achieving Necessary Skills):

The following list summarizes the SCANS competencies addressed in this particular course:

Scan Competencies:

Legend: (1 = Concept; 2 = Application; 3 = Advanced)

C5

Acquires and evaluates information

2

C6

Interprets and communicates information

2

C8

Uses computers to process information

2

C9

Participates as a member of a team: Contributes to group effort

2

C16

Monitors and corrects performance: Distinguishes trends, predicts impacts on system operations, diagnoses systems performance, and corrects malfunctions

1

C17

Improves or Designs Systems: Suggests modifications to existing systems and develops new or alternative systems to improve performance

1

C18

Selects technology: Chooses procedures, tools, or equipment, including computers and related technologies

2

C19

Applies technology to task: Understands overall intent and proper procedures for setup and operation of

2

C20

Maintains and troubleshoots equipment: Prevents, identifies, or solves problems with equipment, including computers and other technologies

2

F1

Reading: Locates, understands, and interprets written information in prose and in documents such as manuals

2

F3

Arithmetic: Performs basic computations; uses basic numerical concepts such as whole numbers, etc.

2

F5

Listening: Receives, attends to, interprets, and responds to verbal messages and other cues

2

F9

Problem solving: Recognizes problems and devises and implements plan of action.

1

F10

Seeing Things in the Mind’s Eye: Organizes and processes symbols, pictures, graphs, objects and other

2

F11

Knowing how to learn: Uses efficient learning techniques to acquire and apply new knowledge and skills.

2

F12

Reasoning:  Discovering a rule or principle underlying the relationship between two or more objects and applies it

2

F13

Responsibility Exerts a high level of effort and perseveres towards goal attainment

2

F14

Self-Esteem: Believes in own self-worth and maintains a positive view of self.

2

F15

Social ability: Demonstrate understanding, friendliness, adaptability, empathy, and politeness in group settings.

2

F16

Self-Management:  Assesses self accurately, sets personal goals, monitors progress, and exhibits self-control.

2

F17

Integrity/Honesty:  Chooses ethical courses of action.   

2


Office Hours

F 9:00 AM - 12:00 PM RRC2 2123

NOTE By Appointment Only

T Th 1:00 PM - 3:00 PM RRC2 2123

NOTE

M W 4:00 PM - 6:00 PM RRC2 2123

NOTE

Published: 01/16/2026 13:55:57