Professional Documents
Culture Documents
INSTRUCTOR’S INFORMATION
Name Al-kadra A. Antao Contact Number 09457740873
Email Address Kadrabanana1994@gmail.com Consultation Hours
COURSE INFORMATION
Course Code ITE185 Course Title Information Assurance and Security Credit Units 3
This course examines fundamentals of network security involved in creating and managing secure computer network environments. Both
Course Description hardware and software topics are considered, including authentication methods, remote access, network security architectures and devices,
cryptography, forensics and disaster recovery plans.
COURSE OUTCOMES
LEARNING PLAN
Learning Outcomes Content/topic Learning strategies and Week Learning Resources Assessment Tools and
activities Methodologies
I. Course overview
II. Setting class expectations Week 1
III. Assigning of reading
materials
LO1. Grasping the security of the Introduction and overview of Principles of Long quiz
different components of Information Assurance and Security Information
information systems, Define information and Security, 4th Edition
encryption techniques and computer security Michael E.
their applications in Recount the history of Whitman – Ph. D.,
security. computer security, and CISM, CISSP \
explain how it evolved into Herbert J. Mattord
information security Class discussion – MBA, CISM, CISSP
Research Assignment Week 2
Define key terms and critical .
concepts of information
security
LO2. Analyze the issues in Denial of service (DOS) attacks Applied Long quiz
managing the security of Explain denial of service Information
Information Systems. (DOS) attacks Security
Identify the major Week 3 Randy J Boyle
components used in a Class discussion
distributed denial of service Research Assignment
(DDOS) attack
LO3. Analyze the risks and Program Security Principles of Reaction paper about
vulnerabilities in systems. Explain how a computer Information the topic
virus works and what it does Security, 4th Edition
(sources of viruses) Michael E.
Non malicious program Week 4 Whitman – Ph. D., Long quiz
errors and; Class discussion CISM, CISSP \
kinds of malicious codes Research Assignment Herbert J. Mattord
Types of malicious codes – MBA, CISM, CISSP
Applied
Information
Security
Randy J Boyle
LO4. Determine the basic Operating System Security Principles of Long quiz
elements of encryption and Models of operating system Information
their use in digital security Security, 4th Edition
signature and Design and secure operating Week 5 Michael E.
authentication. systems Whitman – Ph. D.,
Models of security CISM, CISSP \
User authentication Class discussion Herbert J. Mattord
Research Assignment – MBA, CISM, CISSP
Applied
Information
Security
Randy J Boyle
LO5. Grasping basic IP and Web Threats in Network Applied Long quiz
security protocols. What makes a network Information
vulnerable Security
Threats precursors Randy J Boyle
Message integrity threats / Week 6
Message confidentiality Class discussion Cryptography and
threats Research Assignment Network Security–
Network security controls by A. Kahate–TMH.
LO6. Determine the various risk Database Security and Integrity Principles of Long quiz
mitigation strategy options. Overview and policies for Information
database security Security, 4th Edition Reaction paper
Models for database access Week 7-8 Michael E.
control Whitman – Ph. D.,
Authorization techniques CISM, CISSP \
auditing control Herbert J. Mattord
Class discussion – MBA, CISM, CISSP
Research Assignment
Applied
Information
Security
Randy J Boyle
Security in
Computing–
(3rdEdition)
Charles P.Pfleeger,
Shari
LawrencePfleeger.
PHI.
Cryptography and
Network Security–
by A. Kahate–TMH.
Applied
Information
Security
Randy J Boyle
Security in
Computing–
(3rdEdition)
Charles P.Pfleeger,
Shari
LawrencePfleeger.
PHI.
Cryptography and
Network Security–
by A. Kahate–TMH.
Security in
Computing–
(3rdEdition)
Charles P.Pfleeger,
Shari
LawrencePfleeger.
PHI.
Cryptography and
Network Security–
by A. Kahate–TMH.
Applied
Information
Security
Randy J Boyle
Security in
Computing–
(3rdEdition)
Charles P.Pfleeger,
Shari
LawrencePfleeger.
PHI.
Cryptography and
Network Security–
by A. Kahate–TMH.
Course Requirements
1. Your instructor may or may not explicitly check attendance every day. How-ever, if you are caught exceeding your
Class Policy allowable cuts for the semester, you may be given a grade of 5.
2. In case you cut, it will be your responsibility to know the material covered for the day. The instructor reserves the right
to give unannounced quizzes or graded lab exercises at any time.
3. No makeup tests will be given unless you can present a medical certificate or an immediate member of your family
died. Make up tests will solely be on the teacher’s discretion.
4. Playing games is strictly prohibited during class hours. Web browsing and doing email are also prohibited, unless done
in connection with the current lecture or lab topic and allowed by the teacher.
5. Use of communication devices is prohibited during class hours. Please turn them off during class.
6. Class requirements are due during class hours, unless otherwise specified. Late submission will merit
deductions as specified by the teacher.
7. Cheating will not be tolerated. Cheating in any requirement will result in a minimum penalty of having a grade of 0 for
that requirement. Duplicated projects/lab exercises will merit penalties for both the student who copied and the
student from whom the work was copied.
8. Additional policies, with due consultation with the students, may be implemented by the teacher to adapt to the class
environment. Students are advised to be aware of such updates, and to ask their instructor if anything is unclear.
GRADING SYSTEM TEXBOOK & SUPPLEMENTARY READINGS
th
Principles of Information Security, 4 Edition
Activity Weight in Michael E. Whitman – Ph. D., CISM, CISSP \ Herbert J. Mattord – MBA, CISM, CISSP
Final grade ISBN-13: 9781111138219
___________________________________________ ___________________________________________
Department Chairperson College Dean