ISY 280 Advanced Security Topics

Campus Location:
Georgetown, Dover, Wilmington
Effective Date:
ISY 250, ISY 251


Course Credits and Hours:
3.00 credits
2.00 lecture hours/week
3.00 lab hours/week
Course Description:

This course covers advanced topics in information and network security. Students use knowledge, skills, and abilities to perform related to the field of information security. This course is based on a sequence of hands-on laboratory exercises for teams of students and emphasizes defensive tools and techniques.

Required Text(s):

Obtain current textbook information by viewing the campus bookstore online or visit a campus bookstore. Check your course schedule for the course number and section.

Additional Materials:


Schedule Type:
Classroom Course


Core Course Performance Objectives (CCPOs):
  1. Diagram and implement network design. (CCC 2, 3; PGC 1, 2, 3, 9)
  2.  Install and configure server and desktop Operating Systems (OS). (CCC 1, 2, 3; PGC2, 3, 4, 9)
  3. Configure firewall settings and maintain network security. (CCC 1, 2, 3; PGC 1, 2, 5,7, 9)
  4. Configure and implement intrusion detection systems (IDS) and intrusion prevention systems (IPS). (CCC 1, 2, 3; PGC 1, 2, 5, 8, 9)
  5. Identify and exploit vulnerabilities in a network. (CCC 1, 3, 4, 5; PGC 1, 2, 5, 8)
  6. Prepare and present an incident report. (CCC 1, 2, 3, 5; PGC 1, 5, 6, 7, 8, 9)

See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.

Measurable Performance Objectives (MPOs):

Upon completion of this course, the student will:

  1. Diagram and implement network design.
    1. Plan network topologies.
    2. Construct network diagram(s).
    3. Configure network routers and switches.
  2. Install and configure server and desktop Operating Systems (OS).
    1. Choose the appropriate operating systems for a given scenario.
    2. Install operating systems.
    3. Configure client computers and servers.
  3. Configure firewall settings to maintain network security.
    1. Plan the network access policies.
    2. Implement firewall rules that reflect an organization’s overall security approach.
    3. Enable secure remote access.
  4. Configure and implement intrusion detection systems (IDS) and intrusion prevention systems (IPS).
    1. Differentiate the advantages and disadvantages of implementing IDS and IPS.
    2. Configure an IDS and IPS system.
    3. Configure remote notification service of security alerts.
  5. Identify and exploit vulnerabilities in a network.
    1. Identify and compare vulnerability scanners
    2. Demonstrate ability to scan network devices.
    3. Identify specific vulnerabilities that are present.
    4. Demonstrate ability to exploit vulnerabilities in networked devices.
  6. Prepare and present an incident report.
    1. Analyze log files to determine extent of security incident.
    2. Select the timeframe and methods used to compromise a network.
    3. Justify changes in network or operating system policies to prevent future compromise.
    4. Prepare a presentation that explains and outlines the scope of the security incident.
Evaluation Criteria/Policies:

Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:

92 100 = A
83 91 = B
75 82 = C
0 74 = F

Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.

Core Curriculum Competencies (CCCs are the competencies every graduate will develop):
  1. Apply clear and effective communication skills.
  2. Use critical thinking to solve problems.
  3. Collaborate to achieve a common goal.
  4. Demonstrate professional and ethical conduct.
  5. Use information literacy for effective vocational and/or academic research.
  6. Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
Program Graduate Competencies (PGCs are the competencies every graduate will develop specific to his or her major):
  1. Identify and remediate vulnerabilities
  2. Design, plan, and install network systems
  3. Install and configure operating systems
  4. Demonstrate the ability to write and debug scripts
  5. Demonstrate professionalism and ethical responsibility
  6. Communicate effectively to diverse groups of stakeholders
  7. Perform change management analysis and documentation
  8. Perform evidence collection and forensics analysis
  9. Create, modify, and/or implement security policies.
Disabilities Support Statement:

The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.

Minimum Technology Requirements:
Minimum technology requirements for online, hybrid, video conferencing and web conferencing courses.