SRJC Course Outlines

12/26/2024 8:56:49 AMCS 82.55 Course Outline as of Fall 2020

Inactive Course
CATALOG INFORMATION

Discipline and Nbr:  CS 82.55Title:  COMPUTER SECURITY PRNCPL  
Full Title:  Principles of Computer Security
Last Reviewed:10/14/2013

UnitsCourse Hours per Week Nbr of WeeksCourse Hours Total
Maximum4.00Lecture Scheduled4.0017.5 max.Lecture Scheduled70.00
Minimum4.00Lab Scheduled08 min.Lab Scheduled0
 Contact DHR0 Contact DHR0
 Contact Total4.00 Contact Total70.00
 
 Non-contact DHR0 Non-contact DHR Total0

 Total Out of Class Hours:  140.00Total Student Learning Hours: 210.00 

Title 5 Category:  AA Degree Applicable
Grading:  Grade or P/NP
Repeatability:  00 - Two Repeats if Grade was D, F, NC, or NP
Also Listed As: 
Formerly:  CIS 56.21

Catalog Description:
Untitled document
Students will begin learning the essentials of computer security.  They will be aware of security objectives and the role of policy deployment while practicing to defend against network attacks.  After a review of security trends, concepts, roles and network fundamentals students will learn: cryptography, public key infrastructure, standards and protocols, impact of physical security on computer security, infrastructure security, remote access, wireless and instant messaging, intrusion detection and system baselines. Internet-based curriculum describing a start-up company in which the coverage of CompTIA's Security+ certification exam and the International Information Systems Security Certification Consortium (ISC)2 Systems Security Certified Practitioner (SSCP) certification, focuses on best practices, roles, and responsibilities of security experts, is integral to the course.

Prerequisites/Corequisites:


Recommended Preparation:
Completion of CS 80.13 and CS 82.21A AND Eligibility for ENGL 100 OR ESL 100

Limits on Enrollment:

Schedule of Classes Information
Description: Untitled document
Students will begin learning the essentials of computer security.  They will be aware of security objectives and the role of policy deployment while practicing to defend against network attacks.  After a review of security trends, concepts, roles and network fundamentals students will learn: cryptography, public key infrastructure, standards and protocols, impact of physical security on computer security, infrastructure security, remote access, wireless and instant messaging, intrusion detection and system baselines. Internet-based curriculum describing a start-up company in which the coverage of CompTIA's Security+ certification exam and the International Information Systems Security Certification Consortium (ISC)2 Systems Security Certified Practitioner (SSCP) certification, focuses on best practices, roles, and responsibilities of security experts, is integral to the course.
(Grade or P/NP)

Prerequisites:
Recommended:Completion of CS 80.13 and CS 82.21A AND Eligibility for ENGL 100 OR ESL 100
Limits on Enrollment:
Transfer Credit:
Repeatability:00 - Two Repeats if Grade was D, F, NC, or NP

ARTICULATION, MAJOR, and CERTIFICATION INFORMATION

Associate Degree:Effective:Inactive:
 Area:
 
CSU GE:Transfer Area Effective:Inactive:
 
IGETC:Transfer Area Effective:Inactive:
 
CSU Transfer:Effective:Inactive:
 
UC Transfer:Effective:Inactive:
 
C-ID:

Certificate/Major Applicable: Certificate Applicable Course



COURSE CONTENT

Student Learning Outcomes:
At the conclusion of this course, the student should be able to:
Untitled document
1.   Define and explain cryptography, public key infrastructure, standards and protocols, impact of physical security on computer security, infrastructure security, remote access, wireless and instant messaging, intrusion detection and system baselines.
2.   Solve problems involving security vulnerabilities, wireless technologies, and network security breaches.
3.   Pass a mock certification exam for CompTIA Security+ certification.
 

Objectives: Untitled document
Upon completion of this course, students will be able to:
1.   Examine current computer security vulnerabilities
2.   Describe general computer security concepts
3.   Identify operational and organizational elements central to ensuring a secure computer system environment
4.   Delineate the role of people in security
5.   Evaluate the use of cryptography as a security resource
6.   Analyze public key infrastructure
7.   Evaluate the various standards and protocols used to secure data transmission
8.   Relate a secure physical environment to computer security
9. Critique system infrastructure security components
10. Solve problems involving remote access security vulnerabilities
11. Examine wireless and instant messaging technologies for the vulnerabilities
12. Inspect network security breaches using intrusion detection systems
13. Assess security baselines for network policy implementation

Topics and Scope
Untitled document
I. Computer security vulnerabilities
    A. Identifying security problems
        1. Security incidents
        2. Threats to security
        3. Security trends
    B. Identify various avenues of attack
II. General concepts
    A. Basic security terminology
        1. Security basics
        2. Access control
        3. Authentication
    B. Security models
        1. Confidentiality models
        2. Integrity models
III. Operational and organizational elements
     A. Security operations in an organization
         1. Policies, procedures, standards, and guidelines
         2. The security perimeter
     B. Physical security
         1. Access controls
         2. Physical barriers
     C. Social engineering
     D. Environment
     E. Wireless
     F. Electromagnetic eavesdropping
     G. Location
IV. The role of people in security
     A. People as a security problem
     B. People as a security tool
V. Cryptography
     A. Define algorithms
     B. Hash
     C. Symmetric encryption
     D. Asymmetric encryption
     E. Usage
         1. Confidentiality
         2. Integrity
         3. Nonrepudiation
         4. Authentication
         5. Digital signatures
         6. Key escrow
VI. Public key infrastructure
     A. The basics of public key infrastructures
     B. Certificate authorities
     C. Registration authorities
     D. Certificate repositories
     E. Trust and certificate verification
     F. Digital certificates
     G. Centralized or decentralized infrastructures
     H. Private key protection
     I. Public certificate authorities
     J. In-house certificate authorities
     K. Outsourced certificate authorities
     L. Certificate usage
VII. Standards and protocols used to secure network data transmission
VIII. The impact of physical security on network security
     A. The problem
     B. Physical security safeguards
IX. Network fundamentals
     A. Network architectures
     B. Network topology
     C. Network protocols
     D. Packet delivery
X. Infrastructure security
     A. Devices
     B. Media
     C. Security concerns for transmission media
     D. Removable media
     E. Security topologies
         1. Security zones
         2. Virtual local area networks (VLANs)
         3. Network address translation (NAT)
         4. Tunneling
XI. Remote access
     A. The remote access process
         1. Identification
         2. Authentication
         3. Authorization
     B. Telnet
     C. Secure shell (SSH)
     D. Layer 2 tunneling protocol (L2TP)
     E. Point to point tunneling protocol (PPTP)
     F. Institute of electric and electronics engineers (IEEE) 802.11
     G. Virtual private network (VPN)
     H. Internet protocol security (IPSec)
     I. IEEE 802.1x
     J. Remote authentication dial-in user (RADIUS)
     K. Terminal access controller access control system (TACACS+)
     L. Vulnerabilities
XII. Wireless and instant messaging
XIII. Intrusion detection systems
     A. History of intrusion detection systems
     B. Intrusion detection system (IDS) overview
     C. Host-based intrusion detection systems
     D. Network-based intrusion detection systems
     E. Signatures
     F. False positives and negatives
     G. IDS models
XIV. Security baselines
     A. Overview baselines
     B. Password selection
         1. Password policy guidelines
         2. Selecting a password
         3. Components of a good password
         4. Password aging
     C. Operating System and network operating system hardening
     D. Network Hardening
     E. Application Hardening

Assignments:
Untitled document
1. Online research of current security appliances and best practices
2. Read topical weekly online newsletters and security reports
3. Prepare written security policies and procedures
4. Write 4-6 one-page reports on security problems and their solutions
5. 4-6 quizzes
6. Computer security skills examinations

Methods of Evaluation/Basis of Grade.
Writing: Assessment tools that demonstrate writing skill and/or require students to select, organize and explain ideas in writing.Writing
10 - 30%
Reports
Problem solving: Assessment tools, other than exams, that demonstrate competence in computational or non-computational problem solving skills.Problem Solving
10 - 30%
Written security policies and procedures
Skill Demonstrations: All skill-based and physical demonstrations used for assessment purposes including skill performance exams.Skill Demonstrations
20 - 30%
Computer security skills exams
Exams: All forms of formal testing, other than skill performance exams.Exams
20 - 30%
4-6 quizzes
Other: Includes any assessment tools that do not logically fit into the above categories.Other Category
0 - 20%
Class participation


Representative Textbooks and Materials:
Untitled document
Principles of Computer Security: CompTia Security+ and Beyond (2nd). Nestler, Vincent, et al. McGraw-Hill: 2011

Print PDF