You are on page 1of 6

YTI CAREER INSTITUTE - YORK

SYLLABUS

PROGRAM: Computer Systems Specialist

TERM: Fourth

COURSE TITLE: Introduction to Computer Security CSDE2530

PREREQUISITE: None

CREDIT HOURS: 4

COURSE HOURS: Online instruction is Asynchronous. Weekly assignments are due on


Sunday by 11:59pm, unless otherwise specified by faculty.

INSTRUCTOR: TBD

Faculty bio, contact information, and office hours are posted to the Canvas
INSTRUCTOR CONTACT LMS. Students can expect a response to email inquiries within 24 hours
INFORMATION: Monday through Friday and within 48 hours on the weekends. Students will
be contacted via school email for communication purposes.

DELIVERY: Online / Remote

TEXT: Ciampa, M. (2015). CompTIA Security+ Guide to Network Security


Fundamentals. (5th Ed.). Cengage Learning. ISBN: 978-1-305-09394-2

MATERIALS: Handouts, PowerPoint Presentations, Text, Instructor Web Site

COURSE Students will research, discuss and address industry-current topics related
DESCRIPTION: to computer, network and information security in order to understand
current threats to business and consumers; and, apply risk appropriate
mitigation, detection, and incident response strategies

COURSE At the conclusion of the course the student will:


OBJECTIVE:
Acquire an understanding of current trends and topics in computer,
network and information security and its changing character.
• Understand the importance of security awareness and develop a security
awareness initiative.
• Evaluate the historical evolution of security and the application of various
modern and historical security models and methodologies.
• Evaluate current trends in security legislation and regulations.
• analyze both early and contemporary threats to network security
• Articulate informed opinions and approach computer, network and
information security challenges using utilize logical problem solving skills.
• Identify, investigate and mitigate current and future threats to computer,
network, and information security.
• Appreciate the challenges of computer, network and information
security.
• Understand the challenges of protecting data sensitivity in an every open
and socially-connected society.
• Apply the principles of Confidentiality, Integrity and Availability to protect
information, network and computer systems.
• Implement methods of secure communication over public networks such
as the Internet.
COURSE Students are required to complete all course work, tests, and assignments
REQUIREMENTS: by the assigned due dates. Assignments for online courses are due by
Sunday at 11:59PM unless otherwise specified by the instructor. Lab
assignment due dates may vary. All assignments, exams, and assessments
are submitted through the school’s LMS. Student must achieve a
cumulative grade of 60% or above to successfully pass this course AND
obtain an average score (70%) or above on all competency evaluations
within the given course. Students must receive a passing grade for all
competencies prior to participating in externship

INSTRUCTIONAL A variety of instructional methods will be used to teach this course. This
METHODS: includes but is not limited to course relevant text(s), individual or group
assignments, online lecture videos, demonstrations, web-trips, and lab
simulations.

LEARNING METHODS: Hands on learning activities, online discussion boards, self-study,


homework, research assignments, lab exercises, group work.

LRC: Assignments in this course may require additional research. These


resources can be accessed by utilizing the school’s library system, the
Learning Resource Center (LRC). Students can access the Learning
Resource Center by visiting mylrc.tk, or, through the Canvas LMS by
clicking on “School Links” and then selecting “ProQuest”. For LRC
assistance, choose your campus location on the mylrc.tk website and select
“Contact Us”.

All drawings will be graded and returned to the student for corrections.
Students will receive a midterm report as to their grade at that time.

EVALUATION: Final grades are determined by:


35% - Tests
10% - Quizzes
35% - Lab Assignments and Projects
10% - Homework and current updates
10% - Professional Performance

GRADING SCALE: A 90 – 100%


B 80 – 89%
C 70 – 79%
D 60 – 69%
F Below 60%

Student work needs to be graded and recorded within 48 hours or two class
days from the date of submission. If there is project work that cannot be
graded within 48 hours or 2 days, a grade deadline must be communicated
to the students as part of the project.
GRADE POLICY: Faculty are not permitted to issue extra credit and/or bonus point
opportunities. If a student believes there is a discrepancy with a grade, he
or she should see the instructor of the course in question within 21 days of
the end of the term. If determined that a grade change is necessary, the
instructor will forward a request for grade change to the Registrar’s office.
The Registrar will issue a corrected student grade report.
Refer to the Student Catalog for the attendance policy. Online instruction
ATTENDANCE: and coursework is asynchronous and therefore not assigned a specific time
for participation as long as course objectives are met and assignments are
completed timely. Course materials are accessible by students 24/7. An
activity report is audited every Monday to evaluate student participation for
the previous week. Students are expected to demonstrate routine
attendance weekly and maintain contact with faculty. Any student who does
not maintain contact and complete assigned academic activities for 14
consecutive days will be automatically withdrawn from the program. All
students are encouraged to contact faculty for assistance. Faculty can be
reached via email, chat, and video conferencing can be arranged. Students
may also contact their assigned campus for additional assistance.

Students are responsible for contacting faculty to notify of any extended


MAKE-UP WORK: absence from online classes or any missed lab time. Course materials are
accessible through the Canvas LMS and arrangements should be made
with faculty if extended time is necessary to complete assignments or
make-up assessments and competencies due to illness or other unforeseen
circumstances. Arrangements for missed lab time and performance of
hands-on competencies should be coordinated with faculty to ensure that
students have adequate time to prepare. Make-up labs may be scheduled
outside of a student’s typically scheduled lab hours. The school does not
charge for make-up work.

Students enrolled in hybrid courses can use any web browser, on any
TECHNOLOGY operating system with a release date of 2008 or later. This includes iOS,
REQUIREMENTS: Windows 8, OS/X 10.1 on up, Chromebook, and Linux machines. To
complete worksheets Adobe, PDFExpert, or other PDF reader with
annotation capability is required.
Students are expected to have Internet access to be in a hybrid program.
Microsoft Office is required for all courses. Students should have a
microphone and camera for their computer for collaboration with classmates
and instructors. Most laptops have these tools built into the product

Students enrolled in this program have access to the same IT support as


IT SUPPORT: students attending classes on campus. Students have access to PCI/YTI’s
IT support ticketing system 24 hours per day/7 days per week by submitting
a ticket to:

www.porterchester.edu/studenttechnicalsupport (PCI students)


www.yti.edu/studenttechnicalsupport (YTI students)

and providing information specific to the IT related question or issue


COURSE OUTLINE
Course will be delivered 100% online
Total Course Hours: 72
Didactic Hours: 24
Lab Hours: 48
Week Hours Session Topics Resources Assignments
Weeks 1-3
Didactic: 6
Lab: 12 Topics: Course introduction and review Textbook Assignments:
of syllabus, course material, and course Lecture
outline. Review the challenges Student Laptop Read Ciampa Chapters 1
associated with securing data including: and 2
legacy and modern attacks, conditions
leading to successful attacks, and Complete Chapter 1 and 2
challenges defending against attacks. Review Questions
Review information security
terminology and the importance of Complete Hands-on
information security. Describe the Projects 1-1, 1-2, 1-3, 1-4,
following threat actors: script kiddies, 1-5, 2-1, 2-2, 2-3, 2-4
hactivists, nation state actors, and
insiders. Outline methods to defend Complete Capstone Projects
against attacks. Describe malware and 1-1, 1-2, 1-3, 1-4, 2-1, 2-2,
social engineering attacks. 2-4, 2-6
Weeks 4-6
Textbook Assessments:
Didactic: 6
Lab: 12 Topics: Define cryptography, uses of Lecture
cryptography, and constraints of Student Laptop Chapter 1 and 2 Quiz
cryptography. Describe hash, symmetric,
and asymmetric algorithms. Outline Assignments:
cryptographic attacks such as: algorithm
attacks, known ciphertext attacks, Read Ciampa Chapters 3
downgrade attacks, and collision attacks. and 4
Describe how cryptography is used for:
file and system encryption, operating Complete Chapter 3 and 4
system encryption, and hardware Review Questions
encryption. Explain how to implement
cryptography. Define digital certificates Complete Hands-on
and outline how to manage digital Projects 3-1, 3-2, 3-3, 3-4,
certificates using certificate authorities. 3-4, 3-5, 4-1, 4-2, 4-3, 4-3,
Outline certificate management through
repositories and revocation. Describe the Complete Capstone Projects
various digital certificates including root 3-1, 3-2, 3-3, 3-5, 3-8, 4-1,
and domain digital. Define and describe 4-2, 4-3, 4-4
Public Key Infrastructure (PKI).
Describe cryptographic transport
protocols including SSL, TLS, SSH,
HTTPS, S/MIME, SRTP, IPsec,
Weeks 7-9
Textbook Assessments:
Didactic: 6
Lab: 12 Topics: Describe the different forms of Lecture
network attacks such as: Man-in-the- Student Laptop Chapter 3 and 4 Quiz
Middle (MITM), Man-in-the-Browser
(MITB), Replay, ARP Poisoning, DNS Assignments:
Poisoning, and privilege escalation.
Describe the following server and web Read Ciampa Chapters 5
attacks: Denial of Service (DoS), Web and 6
Server Application, cross-site, injection,
browser hijacking, domain hijacking, Complete Chapter 5 and 6
clickjacking, buffer overflow, integer Review Questions
overflow, and malvertising. Describe the
devices used to secure a network:
bridges, switches, routers, load
balancers, proxies, firewalls, VPN Complete Hands-on
concentrator, network intrusion, Projects 5-1, 5-2, 5-3, 5-4,
detection, and prevention devices. 6-1, 6-2, 6-3, 6-4
Describe network demilitarized zone
(DMZ), how they are deployed, and Complete Capstone Projects
what devices are contained within. 5-1, 5-2, 5-3, 5-4, 5-5, 6-2,
Describe network access control (NAC) 6-4
and Data Loss Prevention (DLP).

Weeks 10-12
Didactic: 6
Lab: 12
Topics: List and describe the functions Textbook Assessments:
of secure network protocols. Explain the Lecture
placement of security devices and Student Laptop Chapter 5 and 6 Quiz
technologies. Explain how security data
can be analyzed. Explain how to manage Assignments:
and secure network platforms. Describe
the different types of wireless attacks Read Ciampa Chapters 7
such as: Bluetooth, near field and 8
communication (NFC), radio frequency
identification (RFID), rogue access Complete Chapter 7 and 8
points, evil twins, intercepting wireless Review Questions
data, wireless replay attack, wireless
denial of service. Outline the Complete Hands-on
vulnerabilities of IEEE wireless security Projects 7-1, 7-2, 7-3, 7-4,
protocols such as WEP, WPA, WPA2. 7-5, 8-1, 8-2, 8-3, 8-4
Review access point configuration
including signal strength, spectrum Complete Capstone Projects
selection, and antennas. 7-1, 7-2, 7-3, 8-1, 8-2, 8-3,
8-4, 8-5

6/16/2020
YTI Career Institute
LRC Research Project – Computer Systems Specialist – Introduction to Computer Security
Project Students are to research the basic security concepts of Confidentiality,
Objective Integrity, and Availability (the CIA triad). Findings should include examples
of how these concepts are integrated into network design and deployment.
Findings will be presented via Microsoft PowerPoint.
Research should Researched and grammatically correct presentation of the topic listed
include above. References must include works beyond the course’s required text.
Students are expected to utilize LRC resources to complete this project. The
LRC can be accessed by visiting mylrc.tk. Questions regarding the LRC can
be directed to Jan.Vergos@yti.edu
Due Date Week 11
Project  10-15 PowerPoint slides including an introduction and conclusion
Requirements  Introduction slide must contain a list of learning objectives (what will
your audience learn/be able to do following the lesson?)
 Must incorporate a hands-on activity for the group (you may provide a
handout or incorporate the activity into a slide)

Total Points 100


Grading RUBRIC  Presentation Length ________/25 points (2 point deduction for
each minute you are over or under the prescribed range.)

 Accuracy of material presented ________/25 points


 Lab / hands-on activity ________/25 points
 Grammar / spelling ________/25 points

6/16/2020

You might also like