Course Number and Title: ISY 243 Information & Network Security
This course introduces computer information and networking security principles and how the field relates to other areas of Information Technology. It covers topics on how to harden a network, protect communications and use cryptography and Public Key Infrastructure (PKI) to thwart attackers. This course also provides the broad-based knowledge necessary to take an optional network security certification examination.
- Apply network security basics to secure the network infrastructure. (CCC 5; PGC 2)
- Assess attackers and their attacks over the Internet. (CCC 5; PGC 2)
- Protect wired and wireless communications. (CCC 5; PGC 2)
- Secure a network with cryptography and digital certificates. (CCC 5; PGC 2)
- Manage operational security with policies and procedures. (CCC 5; PGC 2)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Apply network security basics to secure the network infrastructure.
- Control access to computer systems.
- Harden operating systems, applications, and network.
- Design network topologies.
- Secure removable media and network devices.
- Assess attackers and their attacks over the Internet.
- Develop attacker profiles.
- Identify different types of attacks.
- Examine identity attacks.
- Identify denial of service attacks.
- Distinguish between different types of malicious code.
- Protect wired and wireless communications.
- Securely configure File Transfer Protocol (FTP).
- Setup a secure remote access.
- Secure network directory services.
- Properly configure E-mail systems for secure operation.
- Secure Web communications and instant messaging.
- Setup wireless networks for secure communication.
- Secure a network with cryptography and digital certificates.
- Define cryptography.
- Use cryptography in secured network communications.
- Develop Public Key Infrastructure (PKI).
- Manage Key and digital certificates.
- Manage operational security with policies and procedures.
- Harden physical security with access controls.
- Minimize social engineering.
- Plan for disaster recovery.
- Design, monitor, and review security policies.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Protect personal and networked computing devices.
- Diagnose and respond to security vulnerabilities.
- Monitor and maintain the security of the infrastructure.
- Explain the elements of designing, creating, enforcing and organizational security policy including contingency plans and compliance.
- Install, configure, and manage contemporary industry network operating systems.
- Use the curriculum fundamentals to prepare for industry recognized certifications.
- Demonstrate communication skills and information literacy.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.