NT2580

Introduction to Information Security

ITT Technical Institute

NT2580
Introduction to
Information 
Security
Onsite Course

SYLLABUS
Credit hours: 4.5
Contact/lnstructional hours: 60 (30 Theory Hours, 30 Lab Hours)
Prerequisite(s) and/or Corequisite(s):
          NT1330 Client-Server Networking II or equivalent, NT1430 Linux
Course Description:
This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definitions of terms, concepts, elements and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems.

Instructor: Evan Anderson
Phone: 360-399-6115 (text messages preferred)
Email: evan@eranga.net (work)
            eranderson@itt-tech.edu (school)
Class Hours: Thursday evenings, 6:00 PM – 10:45 PM
Office Hours: Monday, Tuesday, Thursday, and Friday 3:30 PM – 5:30 PM

COURSE OUTLINE
Unit 1 
Date: Thursday, June 16, 2016
Title: Information Systems Security Fundamentals
Assigned Reading: Fundamentals of Information Systems Security, Chapter 1.
Activities:
  • Lab 1.1: Performing Reconnaissance and Probing using Common Tools (2%)
  • (Project Part 1 - Multi-Layered Security Plan - Assigned)
  • Assignment 1.2: Match Risks/Threats to Solutions (1%)
  • Assignment 1.3: Impact of a Data Classification Standard (1%)
Unit 2
Date: Thursday, June 23, 2016
Title: Application of Security Countermeasures to Mitigate Malicious Attacks
Assigned Reading: Fundamentals of Information Systems Security; Chapters 3 and 4.
Activities:
  • Lab 2.1: Performing a Vulnerability Assessment (2%)
  • Project 2.2: Project Part 1 - Multi-Layered Security Plan (6%)
  • (Project Part 2: Student SSCP® Domain Research Paper - Assigned)
  • Assignment 2.3: Calculate the Window of Vulnerability (1%)
  • Assignment 2.4: Microsoft Environment Analysis (1%)
Unit 3
Date: Thursday, June 30, 2016
Title: Appropriate Access Controls for Systems, Applications, and Data Access
Assigned Reading: Fundamentals of Information Systems Security, Chapter 5.
Activities:
  • Lab 3.1: Enabling Windows Active Directory and User Access Controls (2%)
  • Discussion 3.2: Access Control Models (4%)
  • Assignment 3.3: Remote Access Control Policy Definition (1%)
Unit 4
Date: Thursday, July 7, 2016
Title: Effective Implementation of Security Policy
Assigned Reading: Fundamentals of Information Systems Security, Chapter 6.
Activities:
  • Lab 4.1: Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control (2%)
  • Assignment 4.2: Enhance an Existing IT Security Policy Framework (1%)
  • Assignment 4.3: Acceptable Use Policy (AUP) Definition (1%)
Unit 5
Date: Thursday, July 14, 2016
Title: Importance of Testing, Auditing, and Monitoring
Assigned Reading: Fundamentals of Information Systems Security, Chapter 7.
Activities:
  • Lab 5.1: Performing Packet Capture and Traffic Analysis (2%)
  • Assignment 5.2: Testing and Monitoring Security Controls (1%)
  • Assignment 5.3: Define an Acceptable Use Policy (AUP) (1%)
Unit 6
Date: Thursday, July 21, 2016
Title: Role of Risk Management, Response, and Recovery for IT Systems, Applications, and Data
Assigned Reading: Fundamentals of Information Systems Security, Chapter 8.
Activities:
  • Lab 6.1: Implementing a Business Continuity Plan (2%)
  • Assignment 6.2: BCP, DRP, BIA, and Incident Response Plan Mix and Match (1%)
  • Assignment 6.3: Quantitative and Qualitative Risk Assessment Analysis (1%)
Unit 7
Date: Thursday, July 28, 2016
Title: Role of Cryptography in Maintaining Confidentiality and Privacy of Data
Assigned Reading: Fundamentals of Information Systems Security, Chapter 9.
Activities:
  • Lab 7.1: Using Encryption to Enhance Confidentiality and Integrity (2%)
  • Assignment 7.2: Select Appropriate Encryption Algorithms (1%)
  • Assignment 7.3: Design an Encryption Strategy (1%)
Unit 8
Date: Thursday, August 4, 2016
Title: Networks and Communications and their Inherent Weaknesses
Assigned Reading: Fundamentals of Information Systems Security, Chapter 10.
Activities:
  • Lab 8.1: Performing a Web site and Database Attack by Exploiting Identified Vulnerabilities (2%)
  • Assignment 8.2: Network Hardening (1%)
  • Assignment 8.3: Network Security Applications and Countermeasures (1%)
Unit 9
Date: Thursday, August 11, 2016
Title: Mitigation of Risk and Threats from Attacks and Malicious Code
Assigned Reading: Fundamentals of Information Systems Security, Chapter 11.
Activities:
  • Lab 9.1: Eliminating Threats with a Layered Security Approach (2%)
  • Assignment 9.2: List Phases of a Computer Attack (1%)
  • Assignment 9.3: Summary Report on a Malicious Code Attack (1%)
Unit 10
Date: Thursday, August 18, 2016
Title: Information Security Standards and Compliance Laws
Assigned Reading: Fundamentals of Information Systems Security, Chapters 12 and 15.
Activities:
  • Lab 10: Implementing an Information Systems Security Policy (2%)
  • Assignment 1: Mix and Match Compliance Laws (1%)
  • Assignment 2: Examine Real-World Implementations of Security Standards and Compliance Laws (1%)
Unit 11
Date: ThursdayAugust 25, 2016
Title: Course Review and Final Examination
Activities:
  • Project 11.1: Project Part 2: Student SSCP® Domain Research Paper (15%)
  • Exam 11.2: Final Examination (20%)
EVALUATION AND GRADING
Graded assignments will be evaluated using the following weighted categories:
  • Assignment 25%
  • Lab 20%
  • Project 21%
  • Discussion 4%
  • Exam 30%
(Click here for a PDF copy of the entire student syllabus.)
Your browser is out-of-date!

You need to update your browser to view Foliotek correctly. Update my browser now

×