Professional Documents
Culture Documents
SYLLABUS
TERM: Fourth
PREREQUISITE: None
CREDIT HOURS: 4
INSTRUCTOR: TBD
Faculty bio, contact information, and office hours are posted to the Canvas
INSTRUCTOR CONTACT LMS. Students can expect a response to email inquiries within 24 hours
INFORMATION: Monday through Friday and within 48 hours on the weekends. Students will
be contacted via school email for communication purposes.
COURSE Students will research, discuss and address industry-current topics related
DESCRIPTION: to computer, network and information security in order to understand
current threats to business and consumers; and, apply risk appropriate
mitigation, detection, and incident response strategies
INSTRUCTIONAL A variety of instructional methods will be used to teach this course. This
METHODS: includes but is not limited to course relevant text(s), individual or group
assignments, online lecture videos, demonstrations, web-trips, and lab
simulations.
All drawings will be graded and returned to the student for corrections.
Students will receive a midterm report as to their grade at that time.
Student work needs to be graded and recorded within 48 hours or two class
days from the date of submission. If there is project work that cannot be
graded within 48 hours or 2 days, a grade deadline must be communicated
to the students as part of the project.
GRADE POLICY: Faculty are not permitted to issue extra credit and/or bonus point
opportunities. If a student believes there is a discrepancy with a grade, he
or she should see the instructor of the course in question within 21 days of
the end of the term. If determined that a grade change is necessary, the
instructor will forward a request for grade change to the Registrar’s office.
The Registrar will issue a corrected student grade report.
Refer to the Student Catalog for the attendance policy. Online instruction
ATTENDANCE: and coursework is asynchronous and therefore not assigned a specific time
for participation as long as course objectives are met and assignments are
completed timely. Course materials are accessible by students 24/7. An
activity report is audited every Monday to evaluate student participation for
the previous week. Students are expected to demonstrate routine
attendance weekly and maintain contact with faculty. Any student who does
not maintain contact and complete assigned academic activities for 14
consecutive days will be automatically withdrawn from the program. All
students are encouraged to contact faculty for assistance. Faculty can be
reached via email, chat, and video conferencing can be arranged. Students
may also contact their assigned campus for additional assistance.
Students enrolled in hybrid courses can use any web browser, on any
TECHNOLOGY operating system with a release date of 2008 or later. This includes iOS,
REQUIREMENTS: Windows 8, OS/X 10.1 on up, Chromebook, and Linux machines. To
complete worksheets Adobe, PDFExpert, or other PDF reader with
annotation capability is required.
Students are expected to have Internet access to be in a hybrid program.
Microsoft Office is required for all courses. Students should have a
microphone and camera for their computer for collaboration with classmates
and instructors. Most laptops have these tools built into the product
Weeks 10-12
Didactic: 6
Lab: 12
Topics: List and describe the functions Textbook Assessments:
of secure network protocols. Explain the Lecture
placement of security devices and Student Laptop Chapter 5 and 6 Quiz
technologies. Explain how security data
can be analyzed. Explain how to manage Assignments:
and secure network platforms. Describe
the different types of wireless attacks Read Ciampa Chapters 7
such as: Bluetooth, near field and 8
communication (NFC), radio frequency
identification (RFID), rogue access Complete Chapter 7 and 8
points, evil twins, intercepting wireless Review Questions
data, wireless replay attack, wireless
denial of service. Outline the Complete Hands-on
vulnerabilities of IEEE wireless security Projects 7-1, 7-2, 7-3, 7-4,
protocols such as WEP, WPA, WPA2. 7-5, 8-1, 8-2, 8-3, 8-4
Review access point configuration
including signal strength, spectrum Complete Capstone Projects
selection, and antennas. 7-1, 7-2, 7-3, 8-1, 8-2, 8-3,
8-4, 8-5
6/16/2020
YTI Career Institute
LRC Research Project – Computer Systems Specialist – Introduction to Computer Security
Project Students are to research the basic security concepts of Confidentiality,
Objective Integrity, and Availability (the CIA triad). Findings should include examples
of how these concepts are integrated into network design and deployment.
Findings will be presented via Microsoft PowerPoint.
Research should Researched and grammatically correct presentation of the topic listed
include above. References must include works beyond the course’s required text.
Students are expected to utilize LRC resources to complete this project. The
LRC can be accessed by visiting mylrc.tk. Questions regarding the LRC can
be directed to Jan.Vergos@yti.edu
Due Date Week 11
Project 10-15 PowerPoint slides including an introduction and conclusion
Requirements Introduction slide must contain a list of learning objectives (what will
your audience learn/be able to do following the lesson?)
Must incorporate a hands-on activity for the group (you may provide a
handout or incorporate the activity into a slide)
6/16/2020