Faculty Syllabus
ITSY-1300 Fundamentals of Information Security: Cybersecurity
James Webb
Credit Spring 2026
Section(s)
ITSY-1300-009 (17436)
LEC MW 11:00am - 12:20pm RRC RRC2 2207.00
LAB MW 12:20pm - 12:45pm RRC RRC2 2207.00
Course Requirements
Course Requirements
- Credit Hours: 3
- Classroom Contact Hours per week: 2hrs 40mins
- Laboratory Contact Hours per week: 50mins
Course Description: Basic information security goals of availability, integrity, accuracy, and confidentiality. Vocabulary and terminology specific to the field of information security are discussed. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning and administrative controls is also discussed. Additional topics include: instruction in security for network hardware, software, and data including physical security, backup procedures, firewalls, encryption, and protection from viruses.
Pre-requisite: Although there are no prerequisites for this course, it is suggested that you take Fundamentals of Networking Technologies prior to or in the same semester as Fundamentals of Information Security.
Course Rationale To introduce students to a broad range of network security-related topics including: confidentiality, integrity, authentication, and non-repudiation. In addition, students will study elements of security for network hardware, software and data including physical security, encryption, protection from viruses and attacks.
Readings
Approved Course Texts/Readings:
CompTIA Security+ Guide to Network Security Fundamentals
By Ciampa, Mark
Edition : 7TH 22
Publisher: CENGAGE L
ISBN 13: 9780357424377
This course is a First Day course which means your digital book is included as part of your tuition and there is no additional purchase required.
Course Subjects
|
Introduction to Security |
|
Threat Management and Cybersecurity Resources |
|
Threats and Attacks on Endpoints |
|
Endpoint and Application Development Security |
|
Mobile, Embedded, and Specialized Device Security |
|
Basic Cryptography |
|
Public Key Infrastructure and Cryptographic Protocols |
|
Networking Threats, Assessments, and Defenses |
|
Network Security Appliances and Technologies |
|
Cloud and Virtualization Security |
|
Wireless Network Security |
|
Authentication |
|
Incident Preparation, Response, and Investigation |
|
Cybersecurity Resilience |
|
Risk Management and Data Privacy |
Student Learning Outcomes/Learning Objectives
Course Objectives / Learning Outcomes:
- Gather and document security requirements
- Design and document security plan
- Develop data/information assurance plans and implementation strategies
- Identify, analyze, and evaluate infrastructure and network vulnerabilities
- Identify and assess current and anticipated security risks and vulnerabilities
- Gather data and analyze security requirements
- Monitor performance to ensure integrity and confidentiality
- Perform research and analyze requirements
- Monitor, evaluate, and test security conditions and environment
- Incorporate security requirements into design
- Implement and enforce system and user security requirements
- Implement, enforce, and monitor security policies, practices, and procedures
SCANS (Secretary’s Commission on Achieving Necessary Skills):
The following list summarizes the SCANS competencies addressed in this particular course:
Scan Competencies:
Legend: (1 = Concept; 2 = Application; 3 = Advanced)
|
C5 |
Acquires and evaluates information |
2 |
|
C6 |
Interprets and communicates information |
2 |
|
C8 |
Uses computers to process information |
2 |
|
C9 |
Participates as a member of a team: Contributes to group effort |
2 |
|
C16 |
Monitors and corrects performance: Distinguishes trends, predicts impacts on system operations, diagnoses systems performance, and corrects malfunctions |
1 |
|
C17 |
Improves or Designs Systems: Suggests modifications to existing systems and develops new or alternative systems to improve performance |
1 |
|
C18 |
Selects technology: Chooses procedures, tools, or equipment, including computers and related technologies |
2 |
|
C19 |
Applies technology to task: Understands overall intent and proper procedures for setup and operation of |
2 |
|
C20 |
Maintains and troubleshoots equipment: Prevents, identifies, or solves problems with equipment, including computers and other technologies |
2 |
|
F1 |
Reading: Locates, understands, and interprets written information in prose and in documents such as manuals |
2 |
|
F3 |
Arithmetic: Performs basic computations; uses basic numerical concepts such as whole numbers, etc. |
2 |
|
F5 |
Listening: Receives, attends to, interprets, and responds to verbal messages and other cues |
2 |
|
F9 |
Problem solving: Recognizes problems and devises and implements plan of action. |
1 |
|
F10 |
Seeing Things in the Mind’s Eye: Organizes and processes symbols, pictures, graphs, objects and other |
2 |
|
F11 |
Knowing how to learn: Uses efficient learning techniques to acquire and apply new knowledge and skills. |
2 |
|
F12 |
Reasoning: Discovering a rule or principle underlying the relationship between two or more objects and applies it |
2 |
|
F13 |
Responsibility Exerts a high level of effort and perseveres towards goal attainment |
2 |
|
F14 |
Self-Esteem: Believes in own self-worth and maintains a positive view of self. |
2 |
|
F15 |
Social ability: Demonstrate understanding, friendliness, adaptability, empathy, and politeness in group settings. |
2 |
|
F16 |
Self-Management: Assesses self accurately, sets personal goals, monitors progress, and exhibits self-control. |
2 |
|
F17 |
Integrity/Honesty: Chooses ethical courses of action. |
2 |
Office Hours
F 9:00 AM - 12:00 PM RRC2 2123
NOTE By Appointment OnlyT Th 1:00 PM - 3:00 PM RRC2 2123
NOTEM W 4:00 PM - 6:00 PM RRC2 2123
NOTEPublished: 01/16/2026 13:55:57