Course Number and Title: ITN 170 Information Security
This course provides a basic foundation in information security, including terminology, technologies, planning, and implementation. Students explore risk and legal issues related to information security.
Access to high-speed Internet
- Describe the purpose of components used to secure information technology assets. (CCC 1; PGC 4)
- Explain the various methods of attack and how to mitigate the risk. (CCC 1, 2; PGC 1, 3, 4)
- Analyze the asset to determine the appropriate security controls given specific scenarios. (CCC 1, 2; PGC 1, 2, 3, 4)
- Explain the basic concepts of forensics and incident response. (CCC 1, 2; PGC 1, 3)
- Explain the purpose and function of cryptography. (CCC 1, 2; PGC 1, 3, 4)
- Develop a disaster recovery and business continuity plan (DR/BC). (CCC 1, 2, 3, 5; PGC 1, 2, 3, 4)
- Examine information security policies to protect information technology assets. (CCC 1, 2, 3, 5; PGC 1, 2, 3, 4)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Describe the purpose of components used to secure information technology assets.
- Define computer security terminology.
- Explain the purpose and function of key components in information security architecture.
- Explain the various methods of attack and how to mitigate the risk.
- Explain the various types of attacks.
- Identify the indicators of compromise given a scenario.
- Identify the type of attack given a scenario.
- Explain penetration testing concepts.
- Analyze the asset to determine the appropriate security controls given specific scenarios.
- Explain the types and purposes of security controls.
- Select appropriate mitigation controls given a scenario.
- Compare and contrast the function and purpose of authentication services.
- Select appropriate authentication authorization or access control given a scenario.
- Explain the basic concepts of forensics and incident response.
- Describe basic concepts of forensics.
- Follow incident response procedures.
- Explain the purpose and function of cryptography.
- Describe the application and use of symmetric, asymmetric, and public key infrastructure (PKI).
- Explain generalized cryptographic concepts.
- Use appropriate cryptographic methods given a specific scenario.
- Develop a disaster recovery and business continuity plan (DR/BC).
- Describe types of disasters that compromise availability to information.
- Differentiate among the types of DR/BC implementations.
- Draft a DR/BC plan to meet an organization’s needs.
- Examine information security policies to protect information technology assets.
- Analyze security policies in accordance with an organization’s requirements for accuracy and relevancy.
- Draft components of an information security policy to meet an organization's needs.
- Select appropriate data security and privacy practices to meet an organization’s needs.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Solve technology-related problems using critical thinking and troubleshooting skills.
- Articulate the role of the technology professional in organizations to support the ethical use of information technology.
- Apply fundamental security concepts and strategies for maintaining and securing information technology.
- Read and interpret technical information and effectively communicate to a wide range of audiences using oral, print, and multimedia strategies.
- Demonstrate the importance of lifelong learning that empowers personal and professional growth.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.