Bryan · Business and Technology · Info Tech Security - ITSY
Information Tech. Security
- Fall 2018
- Section 383 CRN-13136
- 3 Credits
- 08/27/2018 to 12/13/2018
- Modified 08/30/2018
- Tuesday, Thursday, 4:00 PM to 5:50 PM, F 241
- Thursday, 9:00 AM to 9:50 AM, F 241
- Tuesday, Thursday, 6:00 PM to 6:30 PM, F 242
Schedule an appointment for best results.
Instruction in security for network hardware, software, and data, including physical security; backup procedures; relevant tools; encryption; and protection from viruses.
Prerequisites: Successful Completion of ITNW 1354 or instructor approval.
Core Curriculum Statement
This course is not a core curriculum course.
1. Apply National Institute of Standards and Technology (NIST) Guidelines and other best practices
2. Develop backup/recovery procedures to provide for data security
3. Use network operating system features to implement network security
4. Identify computer and network threats and vulnerabilities and methods to prevent their effects.
5. Use tools to enhance network security.
6. Use encryption techniques to protect network data.
Fundamentals of Information Systems Security
- Author: David Kim and Michael G. Solomon
- Publisher: Jones & Bartlett Learning
- Edition: 3rd
- ISBN: 9781284116458
- Availability: Campus Bookstore and Online
USB Flash thumb drive
CompTIA Security+ certification exam.
Transfers to BAAS degree at SHSU.
Transfers to BAS-IT degree at UHCL
Four major exams and a comprehensive final exam each worth 10% of the course grade
Numerous hands-on labs
Daily contributions to discussion and assignments
A [90, 100] Exceptional knowledge of the material covered
B [80,90] Above average knowledge of the material covered
C [70,80] Average knowledge of the material covered
D [60,70] Less than average knowledge of the material covered
F [0,60] Very little knowledge of the material covered
Blinn College Policies
Notice of any action taken under these protocol and procedures, by Blinn College or its employees, may be delivered by hand, through the U.S. Postal Service, or electronically to the student’s Blinn Buc e-mail account. Notice shall be deemed received upon actual receipt, on deposit in the U.S. Mail, or upon entering the information processing system used by Blinn College for Blinn Buc e-mail accounts, whichever first occurs.
|R||08/30/18||Information Systems Security|
|2||T||09/04/18||The Internet of Things is Changing How We Live||4|
|R||09/06/18||Malicious Attacks, Threats, and Vulnerabilities|
|3||T||09/11/18||Malicious Attacks, Threats, and Vulnerabilities||4|
|W||09/12/18||Important - Day of Record|
|R||09/13/18||The Drivers of the Information Security Business|
|4||T||09/18/18||Access Controls; Exam One (Chapters 1-4)||4|
|5||T||09/25/18||Security Operations and Administration||4|
|R||09/27/18||Security Operations and Administration|
|6||T||10/02/18||Auditing, Testing, and Monitoring||4|
|R||10/04/18||Auditing, Testing, and Monitoring|
|7||T||10/09/18||Exam Two (Chapters 5-7)||4|
|R||10/11/18||Risk, Response, and Recovery|
|8||T||10/16/18||Risk, Response, and Recovery||4|
|R||10/25/18||Networks and Telecommications|
|10||T||10/30/18||Networks and Telecommications||4|
|R||11/01/18||Malicious Code and Activity|
|11||T||11/06/18||Malicious Code and Activity||4|
|R||11/08/18||Exam Three (Chapters 8-11)|
|12||T||11/13/18||Information Security Standards||4|
|R||11/15/18||Information Systems Security Education and Training|
|F||11/16/18||IMPORTANT- Last Day to Drop with a "Q"|
|13||T||11/20/18||Information Systems Security Education and Training||4|
|R||11/22/18||Holiday College Closed|
|14||T||11/27/18||Information Security Professional Certifications||4|
|R||11/29/18||Information Security Professional Certifications|
|15||T||12/04/18||US Compliance Laws||4|
|R||12/06/18||Exam Four (Chapters 12-15)|
|F||12/07/18||LAST DAY OF CLASSES|
|16||T||12/11/18 from 1515-1730||Comprehensive Final Exams||4|
|Total Contact Hours||64|