ISY 243 Information & Network Security


Campus Location:
Georgetown, Dover, Wilmington
Effective Date:
2018-51
Prerequisite:
ISY 143
Co-Requisites:

None

Course Credits and Hours:
4.00 credits
3.00 lecture hours/week
2.00 lab hours/week
Course Description:

This course introduces computer information and networking security principles and how the field relates to other areas of Information Technology. It covers topics on how to harden a network, protect communications and use cryptography and Public Key Infrastructure (PKI) to thwart attackers. This course also provides the broad-based knowledge necessary to take an optional network security certification examination.

Required Text(s):

Obtain current textbook information by viewing the campus bookstore online or visit a campus bookstore. Check your course schedule for the course number and section.

Additional Materials:

None

Schedule Type:
Classroom Course
Disclaimer:

None

Core Course Performance Objectives (CCPOs):
  1. Apply network security basics to secure the network infrastructure. (CCC 5; PGC 2)
  2. Assess attackers and their attacks over the Internet. (CCC 5; PGC 2)
  3. Protect wired and wireless communications. (CCC 5; PGC 2)
  4. Secure a network with cryptography and digital certificates. (CCC 5; PGC 2)
  5. Manage operational security with policies and procedures. (CCC 5; PGC 2)

See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.

Measurable Performance Objectives (MPOs):

Upon completion of this course, the student will:

  1. Apply network security basics to secure the network infrastructure.
    1. Control access to computer systems.
    2. Harden operating systems, applications, and network.
    3. Design network topologies.
    4. Secure removable media and network devices.
  2. Assess attackers and their attacks over the Internet.
    1. Develop attacker profiles.
    2. Identify different types of attacks.
    3. Examine identity attacks.
    4. Identify denial of service attacks.
    5. Distinguish between different types of malicious code.
  3. Protect wired and wireless communications.
    1. Securely configure File Transfer Protocol (FTP).
    2. Setup a secure remote access.
    3. Secure network directory services.
    4. Properly configure E-mail systems for secure operation.
    5. Secure Web communications and instant messaging.
    6. Setup wireless networks for secure communication.
  4. Secure a network with cryptography and digital certificates.
    1. Define cryptography.
    2. Use cryptography in secured network communications.
    3. Develop Public Key Infrastructure (PKI).
    4. Manage Key and digital certificates.
  5. Manage operational security with policies and procedures.
    1. Harden physical security with access controls.
    2. Minimize social engineering.
    3. Plan for disaster recovery.
    4. Design, monitor, and review security policies.
Evaluation Criteria/Policies:

Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:

92 100 = A
83 91 = B
75 82 = C
0 74 = F

Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.

 
Core Curriculum Competencies (CCCs are the competencies every graduate will develop):
  1. Apply clear and effective communication skills.
  2. Use critical thinking to solve problems.
  3. Collaborate to achieve a common goal.
  4. Demonstrate professional and ethical conduct.
  5. Use information literacy for effective vocational and/or academic research.
  6. Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
Program Graduate Competencies (PGCs are the competencies every graduate will develop specific to his or her major):
  1. Protect personal and networked computing devices.
  2. Diagnose and respond to security vulnerabilities.
  3. Monitor and maintain the security of the infrastructure.
  4. Explain the elements of designing, creating, enforcing and organizational security policy including contingency plans and compliance.
  5. Install, configure, and manage contemporary industry network operating systems.
  6. Use the curriculum fundamentals to prepare for industry recognized certifications.
  7. Demonstrate communication skills and information literacy.
Disabilities Support Statement:

The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.

Minimum Technology Requirements:
Minimum technology requirements for online, hybrid, video conferencing and web conferencing courses.