Syllabus
Fundamentals of Information Security: Cybersecurity

Fundamentals of Information Security: Cybersecurity

ITSY-1300

Credit Spring 2021
01/19/2021 - 05/16/2021

Course Information

Section 009
Distance Learning
TTh 13:00 - 14:20
DLS DIL
Nabeel Khan

Section 009
Laboratory
TTh 14:20 - 14:45
DLS DIL
Nabeel Khan

Office Hours

  • M W
    2:00pm - 5:00pm
    Zoom Meeting Room
    For appointment by request, email me: nabeel.khan@austincc.edu

Course Requirements

Quiz:

  • 15 quizzes in total
  • Open book
  • 5 attempts allowed
  • Best score for the attempts will be counted towards the grade

 

 

 

Cryptool Project:

 

Labs:

  • Virtual Labs done in Mindtap
  • Total 12 labs

 

Exam:

  • One Final comprehensive exam at the end of class
  • Open-book

 

Attendance:

  • Video Lectures will be conducted live on Blackboard Collaborate on Tuesday-Thursday: 3:00pm
  • A weblink to connect to Collaborate room will be sent in the email prior to the start of the video lecture
  • Video lecture recordings will be hosted on Blackboard for students who couldn’t attend the lecture live.
  • The Instructor will give out a password during the video lecture. This password will unlock an Attendance survey that will be available in the Blackboard. Students at their own convenience will access the Attendance Survey and enter the password to record their attendance.

 

Readings

CompTIA Security+ Guide to Network Security Fundamentals, 6th Edition

Mark Ciampa
ISBN-10: 1-337-28878-0
ISBN-13: 978-1-337-28878-1

CompTIA Security+ Guide to Network Security Fundamentals, 6th Edition

 

Course Subjects

 

Encryption

Cryptography

Semantics

Syntactical Structures

Counter-measures

 

 

 

 

 

Student Learning Outcomes/Learning Objectives

Introduction to Security

Malware and Social Engineering

Basic Cryptography

Advanced Cryptography and PKI

 

Networking and Server Attacks

Network Security Devices, Design, and Technology

Administering a Secure Network

Wireless Network Security

Client and Application Security

Mobile and Embedded Device Security

 

Authentication and Account Management

Access Management

Vulnerability Assessment and Data Security

Business Continuity

Risk Mitigation