Course Number and Title: ISY 143 Introduction to Information Security
This course introduces students to information security terminology, the legal environment, risk management, security technologies, and security planning and implementation. Students prepare for further study in computer forensics and cyber network protection.
- Discuss computer security terminology. (CCC 5; PGC 6)
- Identify security threats, vulnerabilities, and countermeasures. (CCC 4, 5: PCG 1, 2, 4)
- Describe technical methods to implement and monitor defense strategies. (CCC 2; PGC3, 6)
- Analyze basic network security issues and Web vulnerabilities. (CCC 5; PGC 6)
- Explain the role of government in information security and information secrecy. (CCC 5; PGC 6)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Discuss computer security terminology.
- Define information security properties, services, and attacks.
- Explain the process to manage and improve information security.
- Describe critical information and infrastructure characteristics.
- Identify security threats, vulnerabilities, and countermeasures.
- Describe general strategies for controlling access.
- Describe methods of authentication.
- Explain file security controls methods.
- Employ risk assessment.
- Describe technical methods to implement and monitor defense strategies.
- Explain features and properties of effective file encryption.
- Identify public key cryptography concepts.
- Discuss basic network encryption concepts.
- Analyze basic network security issues and web vulnerabilities.
- Describe Internet host addressing and network inspection tools.
- Describe host naming with the Domain Name System (DNS) and network address translation.
- Identify email security issues.
- Explain the security issues of web-based activities.
- Explain the role of government in information security and information secrecy.
- Describe national information security policy issues and typical policy elements.
- Summarize the major facets of national information security policy.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Identify and remediate vulnerabilities.
- Design, plan, and install network systems.
- Install and configure operating systems.
- Demonstrate the ability to write and debug scripts.
- Demonstrate professionalism and ethical responsibility.
- Communicate effectively to diverse groups of stakeholders.
- Perform change management analysis and documentation.
- Perform evidence collection and forensics analysis.
- Create, modify, and/or implement security policies.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.