SRJC Course Outlines

12/5/2024 8:07:43 PMCIS 56.21 Course Outline as of Fall 2007

Changed Course
CATALOG INFORMATION

Discipline and Nbr:  CIS 56.21Title:  COMPUTER SECURITY PRNCPL  
Full Title:  Principles of Computer Security
Last Reviewed:10/14/2013

UnitsCourse Hours per Week Nbr of WeeksCourse Hours Total
Maximum4.00Lecture Scheduled4.0017.5 max.Lecture Scheduled70.00
Minimum4.00Lab Scheduled017.5 min.Lab Scheduled0
 Contact DHR0 Contact DHR0
 Contact Total4.00 Contact Total70.00
 
 Non-contact DHR0 Non-contact DHR Total0

 Total Out of Class Hours:  140.00Total Student Learning Hours: 210.00 

Title 5 Category:  AA Degree Applicable
Grading:  Grade or P/NP
Repeatability:  00 - Two Repeats if Grade was D, F, NC, or NP
Also Listed As: 
Formerly: 

Catalog Description:
Untitled document
Students will begin learning the essentials of computer security.  They will be aware of security objectives and the role of policy deployment while practicing to defend against network attacks.  After a review of security trends, concepts, roles and network fundamentals students will learn: cryptography, public key infrastructure, standards and protocols, impact of physical security on computer security, infrastructure security, remote access, wireless and instant messaging, intrusion detection and system baselines. Internet-based curriculum describing a start-up company in which the coverage of CompTIA's Security+ certification exam and the (ISC)2 SSCP certification, which focuses on best practices, roles, and responsibilities of security experts, is integral to the course.

Prerequisites/Corequisites:


Recommended Preparation:
Eligibility for ENGL 100 OR ESL 100, AND Completion of CIS 51.13 and CIS 58.81A

Limits on Enrollment:

Schedule of Classes Information
Description: Untitled document
Essentials of computer security, covering: cryptography public key infrastructure, standards and protocols, physical security, infrastructure, remote access, wireless and instant messaging, intrusion detection and system baselines. Preparation for CompTIA's Security+ exam.
(Grade or P/NP)

Prerequisites:
Recommended:Eligibility for ENGL 100 OR ESL 100, AND Completion of CIS 51.13 and CIS 58.81A
Limits on Enrollment:
Transfer Credit:CSU;
Repeatability:00 - Two Repeats if Grade was D, F, NC, or NP

ARTICULATION, MAJOR, and CERTIFICATION INFORMATION

Associate Degree:Effective:Inactive:
 Area:
 
CSU GE:Transfer Area Effective:Inactive:
 
IGETC:Transfer Area Effective:Inactive:
 
CSU Transfer:TransferableEffective:Spring 2006Inactive:Fall 2020
 
UC Transfer:Effective:Inactive:
 
C-ID:

Certificate/Major Applicable: Certificate Applicable Course



COURSE CONTENT

Outcomes and Objectives:
At the conclusion of this course, the student should be able to:
Untitled document
Upon completion of this course, students will be able
to:
1. Examine current computer security vulnerabilities
2. Describe general computer security concepts
3. Identify operational and organizational elements central to ensuring a
secure computer system environment
4. Delineate the role of people in security
5. Evaluate the use of cryptography as a security resource
6. Analyze public key infrastructure
7. Evaluate the various standards and protocols used to secure
data transmission
8. Relate a secure physical environment to computer security
9. Include network fundamentals into the process of securing a
Local Area Network (LAN)
10. Critique system infrastructure security components
11. Solve problems involving remote access security vulnerabilities
12. Examine wireless and instant messaging technologies for the
vulnerabilities
13. Inspect network security breaches using intrusion detection systems
14. Assess security baselines for network policy implementation

Topics and Scope
Untitled document
Topics will include but not be limited to:
I. Computer security vulnerabilities
A. Identifying security problems
 1. Security incidents
 2. Threats to security
 3. Security trends
B. Identify various avenues of attack
II. General concepts
A. Basic security terminology
 1. Security basics
 2. Access control
 3. Authentication
B. Security models
 1. Confidentiality models
 2. Integrity models
III. Operational and organizational elements
A. Security operations in an organization
 1. Policies, procedures, standards, and guidelines
 2. The security perimeter
B. Physical security
 1. Access controls
 2. Physical barriers
C. Social engineering
D. Environment
E. Wireless
F. Electromagnetic eavesdropping
G. Location
IV. The role of people in security
A. People as a security problem
B. People as a security tool
V. Cryptography
A. Define algorithms
B. Hash
C. Symmetric encryption
D. Asymmetric encryption
E. Usage
 1. Confidentiality
 2. Integrity
 3. Nonrepudiation
 4. Authentication
 5. Digital signatures
 6. Key escrow
VI. Public key infrastructure
A. The basics of public key infrastructures
B. Certificate authorities
C. Registration authorities
D. Certificate repositories
E. Trust and certificate verification
F. Digital certificates
G. Centralized or decentralized infrastructures
H. Private key protection
I. Public certificate authorities
J. In-house certificate authorities
K. Outsourced certificate authorities
L. Certificate usage
VII. Standards and protocols used to secure network data transmission
VIII. The impact of physical security on network security
A. The problem
B. Physical security safeguards
IX. Network fundamentals
A. Network architectures
B. Network topology
C. Network protocols
D. Packet delivery
X. Infrastructure security
A. Devices
B. Media
C. Security concerns for transmission media
D. Removable media
E. Security topologies
 1. Security zones
 2. Virtual local area networks (VLANs)
 3. Network address translation (NAT)
 4. Tunneling
XI. Remote access
A. The remote access process
 1. Identification
 2. Authentication
 3. Authorization
B. Telnet
C. Secure shell (SSH)
D. Layer 2 tunneling protocol (L2TP)
E. Point to point tunneling protocol (PPTP)
F. Institute of electric and electronics engineers (IEEE) 802.11
G. Virtual private network (VPN)
H. Internet protocol security (IPSec)
I. IEEE 802.1x
J. Remote authentication dial-in user (RADIUS)
K. Terminal access controller access control system (TACACS+)
L. Vulnerabilities
XII. Wireless and instant messaging
XIII. Intrusion detection systems
A. History of intrusion detection systems
B. Intrusion detection system (IDS) overview
C. Host-based intrusion detection systems
D. Network-based intrusion detection systems
E. Signatures
F. False positives and negatives
G. IDS models
XIV. Security baselines
A. Overview baselines
B. Password selection
 1. Password policy guidelines
 2. Selecting a password
 3. Components of a good password
 4. Password aging
C. Operating System and network operating system hardening
D. Network Hardening
E. Application Hardening

Assignments:
Untitled document
Reading assignments may include:
1. Online research of current security appliances and best practices
2. Topical weekly online newsletters and security reports
Homework Problems may include
1. Preparing security policies and procedures
2. Interacting online with other students to solve basic security
problems and write short reports of their proposed solutions
Other assignments may include:
1. Objective examinations and quizzes
2. Skill demonstration examinations

Methods of Evaluation/Basis of Grade.
Writing: Assessment tools that demonstrate writing skill and/or require students to select, organize and explain ideas in writing.Writing
10 - 30%
Reading reports
Problem solving: Assessment tools, other than exams, that demonstrate competence in computational or non-computational problem solving skills.Problem Solving
10 - 30%
Homework problems
Skill Demonstrations: All skill-based and physical demonstrations used for assessment purposes including skill performance exams.Skill Demonstrations
20 - 30%
Performance exams
Exams: All forms of formal testing, other than skill performance exams.Exams
20 - 30%
Multiple choice, True/false, Short answer
Other: Includes any assessment tools that do not logically fit into the above categories.Other Category
0 - 20%
Attendance and class participation


Representative Textbooks and Materials:
Untitled document
Fundamentals of Network Security by Eric Maiwald Publisher:
McGraw-Hill/Irwin Publication Date: November 2003 ISBN:0-07-223094-0
Principles of Computer Security: Security+ and Beyond by Wm. Arthur
Conklin, Gregory B. White, Chuck Cothren, Dwayne Williams, Roger L. Davis
Publisher: McGraw-Hill/Irwin Publication Date: March 2004.

Print PDF