Course Syllabus

Information Technology Security

ITSY 1342


Semester with Course Reference Number (CRN)

Fall 2012
32671

Instructor contact information (phone number and email address)

Pham Dai Xuan

Tel.:  (84-8) 37155033, ext. 1551

Email: xuanpd@saigontech.edu.vn

Website: http://www.saigontech.edu.vn/faculty/XuanPD/

 

Nguyen Hai Son

Tel.:  (84-8) 37155033, ext. 1684

Email: sonnh@saigontech.edu.vn

Office Location and Hours

Office: Room 610, Saigontech Tower, Quang Trung Software City

Office Hours: 7:30 – 17:00

Course Location/Times

Lecture:

    Room 703, Saigontech Tower, Quang Trung Software City

    Friday, 13:00 - 14:30

    Saturday, 7:30 - 9:00

Lab:

    Room 703, Saigontech Tower, Quang Trung Software City

    Saturday, 9:10 - 10:40

Course Semester Credit Hours (SCH) (lecture, lab) If applicable

Credit Hours:

3

 

Lecture Hours:

2

 

Laboratory Hours:

1

 

External Hours:

 

 

Total Course Contact Hours

72

Course Length (number of weeks)

16

Type of Instruction

Lecture

Lecture/Lab

Course Description:

The fundamentals of information security by using the CompTIA Security+ exam objectives as its framework.

 

Comprehensive view of security by examining the attacks that are launched against networks and computer systems, the necessary defense mechanisms, and even offers end-user practical tools, and techniques to counter attackers.

Course Prerequisite(s)

PREREQUISITE(S):

  • ITMT 1340
  • ITMT 1350


  FREQUENT REQUISITES

  • College Level Reading
  • College Level Mathematics
  • College Level Writing

Academic Discipline/CTE Program Learning Outcomes (PLO)

1. Install, configure, upgrade, and troubleshoot personal computer operating systems. Install, configure and troubleshoot networking hardware, protocols and services.

2. Manage and Maintain a Microsoft Windows Server 2008 Environment/Network Infrastructure.

3. Demonstrate knowledge in General Security Concepts, Communication Security,

Infrastructure Security, and Unified Communications

Course Student Learning Outcomes (SLO): 4 to 7

1. Fundamentals of information security

2. Network security

3. Access control, authentication and account management

4. Cryptography

5. Business continuity and risk mitigation

Learning Objectives (Numbering system should be linked to SLO - e.g., 1.1, 1.2, 1.3, etc.)

1. Fundamentals of information security

    1.1 Attackers

    1.2 Steps for attacks

    1.3 Defenses against attacks

    1.4 Application and network attacks

    1.5 Vulnerability assessment and mitigating attacks

    1.6 Host, application, and data security

2. Network Security

    2.1 Security through network devices

    2.2 Security through network technologies

    2.3 Security through network design elements

    2.4. Administrating a secure network

    2.5 Wireless network security

3. Access control, authentication and account Management

    3.1 Implementing Access control

    3.2 Authentication services

    3.3 Authentication credentials

    3.4 Single sign-on

    3.5 Account management

4. Cryptography

    4.1 Cryptography and basic cryptographic algorithms

    4.2 Using cryptography

    4.3 Digital certificates

    4.4 Public key infrastructure

5. Business Continuity and risk mitigation

    5.1 Disaster recovery

    5.2 Environmental control

    5.3 Controlling risks

    5.4 Reducing risks using policies

Instructional Methods

Face to Face

Instructor's Requirements

It is your responsibility to read the textbook and the supplemental materials posted in the blackboard, complete assignments in time, participate in the classroom exercises and activities, and attend class regularly.

 

As I believe that engaging the students in the learning is essential for teaching to be effective, you will spend the majority of class time involved in collaborative activities. You will be involved in class exercises, collaborate with your classmates and your instructor.  As you will want to contribute to these discussions, you will need to come to class prepared to discuss, analyze and evaluate information from your text and other assigned readings.

Course Policies on Make-up Exams, Late Assignments, Tardiness

Students are expected to take each exam on the scheduled dates.

 

Make-up exams are not guaranteed, but are granted at the discretion of the instructor. If make-up exams are allowed, it is necessary to make arrangements with the instructor prior to exam date.

 

Students will not be able to submit assignments, projects after the due/closing date.

Grading Scheme

A = 100- 90

B = 89 – 80

C = 79 – 70

D = 69 – 60

F = 59 and below

The passing grade of this course is D.

Instructor Grading Criteria

Lab/Homework:      40%

Quizzes:                 10%

Mid-term Exam:      25%

Final Exam:            25%

Instructional Materials

Mark Ciampa, Security+ Guide to Network Security Fundamentals, Fourth Edition. Course Technology, Cengage Learning, 2012, ISBN 13: 978-1-1116-4012-5

 

Dean Farwood, Lab Manual for Security+ Guide to Network Security Fundamentals, Fourth Edition. Course Technology, Cengage Learning, 2012, ISBN 13:978-1-111-64013-2

 

Course Calendar

 

Week

Date

Topics

Note

1

Fri, Sept. 21

Introduction to security

Chapter 1

Sat, Sept. 22

Introduction to security (Cont’d)

Chapter 1

Sat, Sept. 22

Tutor Session

 

2

Fri, Sept. 28

Quiz

Malware and social Engineering attacks


Chapter 2

Sat, Sept. 29

Malware and social Engineering attacks (Cont’d)

Chapter 2

Sat, Sept. 29

Tutor Session

 

3

Fri, Oct. 5

Quiz

Application and network attacks


Chapter 3

Sat, Oct. 6

Application and network attacks (Cont’d)

Chapter 3

Sat, Oct. 6

Tutor Session

 

4

Fri, Oct. 12

Quiz

Vulnerability assessment and mitigating attacks


Chapter 4

Sat, Oct. 13

Vulnerability assessment and mitigating attacks (Cont’d)

Chapter 4

Sat, Oct. 13

Tutor Session

 

5

Fri, Oct. 19

Quiz

Host, application, and data security


Chapter 5

Sat, Oct. 20

Host, application, and data security (Cont’d)

Chapter 5

Sat, Oct. 20

Tutor Session

 

6

Fri, Oct. 26

Quiz

Network security


Chapter 6

Sat, Oct. 27

Network security (Cont’d)

Chapter 6

Sat, Oct. 27

Tutor Session

 

7

Fri, Nov. 2

Quiz

Administering a secure network


Chapter 7

Sat, Nov. 3

Administering a secure network (Cont’d)

Chapter 7

Sat, Nov. 3

Tutor Session

 

8

Fri, Nov. 9

Review

 

Sat, Nov. 10

Mid-term exam

 

Sat, Nov. 10

Tutor Session

 

9

Fri, Nov. 16

Quiz

Wireless network security


Chapter 8

Sat, Nov. 17

Wireless network security (Cont’d)

Chapter 8

Sat, Nov. 17

Tutor Session

 

10

Fri, Nov. 23

Quiz

Access control fundamentals


Chapter 9

Sat, Nov. 24

Access control fundamentals (Cont’d)

Chapter 9

Sat, Nov. 24

Tutor Session

 

11

Fri, Nov. 30

Quiz

Authentication and account management


Chapter 10

Sat, Dec. 1

Authentication and account management (Cont’d)

Chapter 10

Sat, Dec. 1

Tutor Session

 

12

Fri, Dec. 7

Quiz

Basic cryptography


Chapter 11

Sat, Dec. 8

Basic cryptography (Cont’d)

Chapter 11

Sat, Dec. 8

Tutor Session

 

13

Fri, Dec. 14

Quiz

Advanced cryptography


Chapter 12

Sat, Dec. 15

Advanced cryptography (Cont’d)

Chapter 12

Sat, Dec. 15

Tutor Session

 

14

Fri, Dec. 21

Quiz

Business contiguity


Chapter 13

Sat, Dec. 22

Business contiguity (Cont’d)

Chapter 13

Sat, Dec. 22

Tutor Session

 

15

Fri, Dec. 28

Review

 

Sat, Dec. 29

Final Exam

 

Sat, Dec. 29

Tutor Session

 

16

Fri, Jan. 4

Risk mitigation

Chapter 14

Sat, Jan. 5

Risk mitigation (Cont’d)

Chapter 14

Sat, Jan. 5

Tutor Session