Untitled

Web Schedules

Fall 2023
Spring 2023
Summer 2023

One Credit Courses

Fall 2023
Spring 2023
Summer 2023

No Cost Textbook/Resources Courses

Fall 2023
Spring 2023
Summer 2023

Low Cost Textbook/Resources Courses

Fall 2023
Spring 2023
Summer 2023

Course Planning by Program

2023-24

Essential Objectives

Course Syllabus


Revision Date: 24-Jan-23
 

Spring 2023 | CIS-2255-VO01 - Principles and Management of Cybersecurity


Online Class

Online courses take place 100% online via Canvas, without required in-person or Zoom meetings.

Location: Online
Credits: 3 (45 hours)
Day/Times: Meets online
Semester Dates: 01-24-2023 to 05-08-2023
Last day to drop without a grade: 02-12-2023 - Refund Policy
Last day to withdraw (W grade): 03-26-2023 - Refund Policy
This course has started, please contact the offering academic center about registration

Faculty

Jim Hoag
View Faculty Credentials

Hiring Coordinator for this course: Debra Grant

General Education Requirements


This section meets the following VSC General Education Requirement(s) for Catalog Year 21-22 and later:
Digital and Technical Literacy
    Note
  1. Many degree programs have specific general education recommendations. In order to avoid taking unnecessary classes, please consult with additional resources like your program evaluation, your academic program catalog year page, and your academic advisor.
  2. Courses may only be used to meet one General Education Requirement.

Course Description

Students explore the broad range of concepts involved in protecting information assets within computer systems and networks. The course covers law, ethics, cryptography, and the fundamentals of system and network security. Students develop strategies for identifying and remediating personal and physical vulnerabilities based on the CIA Triangle security model (confidentiality, integrity, and availability).


Essential Objectives

1. Define issues critical to information security and risk management in a professional environment.
2. Describe the need for contingency planning and discuss scenarios.
3. Analyze information security policy in a business setting.
4. Demonstrate security policy models.
5. Define and discuss security management practices.
6. Identify control classification categories established and maintained by NIST (National Institute for Standards and Technologies) and the ISO (International Organization for Standardization).
7. Evaluate protection mechanisms and formulate cost basis analysis for implementation.
8. Create a SETA plan (security, education, training, and awareness) for an organization or business.


Required Technology

More information on general computer and internet recommendations is available on the CCV IT Support page. https://support.ccv.edu/general/computer-recommendations/

Please see CCV's Digital Equity Statement (pg. 45) to learn more about CCV's commitment to supporting all students access the technology they need to successfully finish their courses.


Required Textbooks and Resources

The last day to use a Financial Aid Advance to purchase textbooks/books is the 3rd Tuesday of the semester. See your financial aid counselor at your academic center if you have any questions.


Methods

  • Reading textbook
  • Notes from instructor
  • Group Discussions

Evaluation Criteria

  • Assignments: 30%
  • Discussion: 20%
  • Quizzes: 20%
  • Tests: 30%

Grading Criteria

CCV Letter Grades as outlined in the Evaluation System Policy are assigned according to the following chart:

 HighLow
A+10098
A Less than 9893
A-Less than 9390
B+Less than 9088
B Less than 8883
B-Less than 8380
C+Less than 8078
C Less than 7873
C-Less than 7370
D+Less than 7068
D Less than 6863
D-Less than 6360
FLess than 60 
P10060
NPLess than 600


Weekly Schedule


Week/ModuleTopic  Readings  Assignments
 

1

Chapter 1 What is Information Security?

  

Chapter 1 Foundations of Information Security, Andress

  

Exercises from end of Chapter and instructor

 

2

Identification and Authentication

  

Chapter 2 Foundations of Information Security, Andress

  

Discussions and Exercises from end of Chapter and instructor

 

3

Authorization and Access Controls

  

Chapter 3 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

4

Auditing and Accountability

  

Chapter 4 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

5

Cryptography

  

Chapter 5 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

6

Compliance, Laws, and Regulations

  

Chapter 6 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

7

Operations Security

  

Chapter 7 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

8

Human Elements Security

  

Chapter 8 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

9

Physical Security

  

Chapter 9 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

10

Network Security

  

Chapter 10 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

11

Operating System Security

  

Chapter 11 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

12

Mobile, Embedded, and Internet of Things Security

  

Chapter 12 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

13

Application Security

  

Chapter 13 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

14

Assessing Security

  

Chapter 14 Foundations of Information Security, Andress

  

Discussion and Exercises from end of Chapter and instructor

 

15

Project

  

Textbook, Instructor Notes, and previous content

  

Group projects.

 

Attendance Policy

Regular attendance and participation in classes are essential for success in and are completion requirements for courses at CCV. A student's failure to meet attendance requirements as specified in course descriptions will normally result in a non-satisfactory grade.

  • In general, missing more than 20% of a course due to absences, lateness or early departures may jeopardize a student's ability to earn a satisfactory final grade.
  • Attending an on-ground or synchronous course means a student appeared in the live classroom for at least a meaningful portion of a given class meeting. Attending an online course means a student posted a discussion forum response, completed a quiz or attempted some other academically required activity. Simply viewing a course item or module does not count as attendance.
  • Meeting the minimum attendance requirement for a course does not mean a student has satisfied the academic requirements for participation, which require students to go above and beyond simply attending a portion of the class. Faculty members will individually determine what constitutes participation in each course they teach and explain in their course descriptions how participation factors into a student's final grade.


Participation Expectations

To earn full participation points for the week, students should:

  • Read the assigned material and demonstrate an understanding of those resources in your assignments and posts..
  • Post an original response to the weekly prompt(s) before due date.. You are welcome to post early and/or more frequently, as your schedule allows, but you will not receive full credit if you do not meet these minimum requirements and/or deadlines.
  • Assignment answers and Discussion posts should be substantive and demonstrate college-level writing. A substantive post is well-developed, with references if required. A substantive post is NOT one or two sentences of general statements or unsupported opinion. You may receive partial credit if you do not meet this requirement.


Missing & Late Work Policy

Assignments are expected to be submitted on the date due. Late assignments will be assessed a 10% per day deduction for 5 days (down to 50%) and after that they will not be accepted. Similarly , discussions must be completed prior to the due date.


Accessibility Services for Students with Disabilities:


CCV strives to mitigate barriers to course access for students with documented disabilities. To request accommodations, please
  1. Provide disability documentation to the Accessibility Coordinator at your academic center. https://ccv.edu/discover-resources/students-with-disabilities/
  2. Request an appointment to meet with accessibility coordinator to discuss your request and create an accommodation plan.
  3. Once created, students will share the accommodation plan with faculty. Please note, faculty cannot make disability accommodations outside of this process.


Academic Integrity


CCV has a commitment to honesty and excellence in academic work and expects the same from all students. Academic dishonesty, or cheating, can occur whenever you present -as your own work- something that you did not do. You can also be guilty of cheating if you help someone else cheat. Being unaware of what constitutes academic dishonesty (such as knowing what plagiarism is) does not absolve a student of the responsibility to be honest in his/her academic work. Academic dishonesty is taken very seriously and may lead to dismissal from the College.