...CIS4361C IT Security Course Syllabus Version 1 FALL 2015 Course Description This course introduces students to information security. Security often involves social and organizational skills as well as technical understanding. In order to solve the practical security problems, we must balance real-world risks and rewards against the cost and bother of available security techniques. During this course we will use continuous process improvement to investigate these elements. Security is a very broad field. Some people may excel in the technical aspects, while others may do better in more social or process-oriented aspects. Others will successfully succeed between these poles. This course applies to all students, and help you find where you will excel. To learn a solid understanding of security technology, look must look closely at the underlying strengths and weakness of information technology itself. This requires particularly in cryptography (diagram or in mathematical notation). The book will use both, but is bias toward diagrams. Prerequisites COP2253 Java Programming or COP2830 Script Programming Student Learning Outcomes Upon completion of this course, students will be able to: * Describe the common treats of information and communication systems * Identify safeguards for securing data and systems * Gather and analyze digital evidence after a security breach * Develop an IT security program based upon a risk assessment Course Objectives ...
Words: 1802 - Pages: 8
...STAFFING MANAGEMENT INSTRUCTOR’S MANUAL Four Recruitment and Retention Case Scenarios By Marcia R. Gibson, Ed.D. Project team Author: SHRM Project contributors: External contributor: Editor: Design: Marcia R. Gibson, Ed.D. Nancy A. Woolever, SPHR Sharon H. Leonard Courtney J. Cornelius, copy editor Kellyn Lombardi, graphic designer © 2008 Society for Human Resource Management. Marcia R. Gibson, Ed.D. Note to Hr faculty and instructors: SHRM cases and modules are intended for use in HR classrooms at universities. Teaching notes are included with each. While our current intent is to make the materials available without charge, we reserve the right to impose charges should we deem it necessary to support the program. However, currently, these resources are available free of charge to all. Please duplicate only the number of copies needed, one for each student in the class. For more information, please contact: SHRM Academic Initiatives 1800 Duke Street, Alexandria, VA 22314, USA Phone: (800) 283-7476 Fax: (703) 535-6432 Web: www.shrm.org/hreducation 08-0873-IM Introduction These recruitment and retention case scenarios are designed to be presented sequentially, since each scenario builds upon the previous one. They are intended for undergraduate college students. LearNING oBjectIVeS Students will learn to: Determine recruitment needs. Identify recruitment policies and guidelines. Determine a recruitment strategy. Develop a communication plan to implement...
Words: 6125 - Pages: 25
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...
Words: 1834 - Pages: 8
...Course Design Guide College of Information Systems & Technology ENG/221 Version 5 Technical Writing Fundamentals Copyright © 2012, 2011, 2010, 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course covers the fundamentals and best practices of using written communication in business and in the information technologies. Topics include strategies, techniques, and nuances for producing e-mails, memos, reports, proposals, project specifications, and user manuals, as well as other technical documents. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Dobrin, S. I., Keller, C. J., & Weisser, C. R. (2010). Technical communication in the twenty-first century (2nd ed.). Upper Saddle River, NJ: Prentice Hall. Gerson, S. J., & Gerson, S. M. (2012). Technical communication: Process and product (7th ed.). Upper Saddle River, NJ: Prentice Hall. All electronic...
Words: 2072 - Pages: 9
...Intro: Virtual Organization is the measure for providing practice and functions of work in a corporation. This provides the view and functions of a corporation’s website and the interior sections for employees’ website. This provides students the ability to be aware of the sections of a corporation’s functions with or before the work experience. The education in this provides the viewpoints necessary for organization and maintaining a corporate world. This manual provides the different sections of different work environments for corporations. This is a measure of providing a learning experience. Those that are new to the work concept will learn the basis of the corporation from the Virtual Organization. This is a functional level of experience by a virtual corporation. However, these are not actually correct in the information they provide. They are decided and engineered forms of a corporation’s websites with outer and internal functions. This assists with the education of a company’s work provided by its virtual websites. Towards the ending of the manual are the measures necessary to follow for attaining the Virtual Organization website. The key factors of login, materials, and selection for Virtual organization explained toward the end of the manual with brief pictures for view. The last paragraphs of the manual will provide a conclusion of the functions and guidance for the student’s future use of the Virtual Organization website. ...
Words: 4462 - Pages: 18
...E-learning refers to the use of electronic media and information and communication technologies (ICT) in education. E-learning is broadly inclusive of all forms of educational technology in learning and teaching. E-learning is inclusive of, and is broadly synonymous with multimedia learning, technology-enhanced learning (TEL), computer-based instruction (CBI), computer-based training (CBT), computer-assisted instruction or computer-aided instruction (CAI), internet-based training (IBT), web-based training (WBT), online education, virtual education, virtual learning environments (VLE) (which are also called learning platforms), m-learning, and digital educational collaboration. These alternative names emphasize a particular aspect, component or delivery method. E-learning includes numerous types of media that deliver text, audio, images, animation, and streaming video, and includes technology applications and processes such as audio or video tape, satellite TV, CD-ROM, and computer-based learning, as well as local intranet/extranet and web-based learning. Information and communication systems, whether free-standing or based on either local networks or the Internet in networked learning, underly many e-learning processes.[1] E-learning can occur in or out of the classroom. It can be self-paced, asynchronous learning or may be instructor-led, synchronous learning. E-learning is suited to distance learning and flexible learning, but it can also be used in conjunction with face-to-face...
Words: 6899 - Pages: 28
...The eLearning Guild’s Handbook of e-Learning Strategy Foreword by Marc Rosenberg Chapters by Kevin Moore, Frank Hanfland, Patti Shank, Lisa Young, Lance Dublin, Ryan Watkins, Michael Corry Bill Brandon, Editor Sponsored by Compilation Copyright ©2007 by The eLearning Guild Published by The eLearning Guild 375 E Street, Suite 200 Santa Rosa, CA 95404 www.elearningguild.com Individual chapters and the Foreword are Copyright ©2007 by their respective authors. You may download, display, print, and reproduce this material in unaltered form only (retaining this notice) for your personal, non-commercial use or use within your organization. All other rights are reserved. This is a FREE Digital e-Book. No one is authorized to charge a fee for it or to use it to collect data. Attribution notice for information from this publication must be given, must credit the individual author in any citation, and should take the following form: The eLearning Guild's Handbook of e-Learning Strategy. Readers should be aware that Internet Web sites offered as citations or sources for further information may have disappeared or been changed between the date this book was written and the date it is read. Other FREE Digital e-Books by The eLearning Guild include: The eLearning Guild's Handbook on Synchronous e-Learning 834 Tips for Successful Online Instruction 328 Tips on the SELECTION of an LMS or LCMS 339 Tips on the IMPLEMENTATION of an LMS or LCMS 311 Tips on the MANAGEMENT of an LMS or LCMS Publisher:...
Words: 43258 - Pages: 174
...curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 ...
Words: 18421 - Pages: 74
...------------------------------------------------- Top of Form Effects of Technology on Education By Anton Lebedev | Submitted On January 22, 2010 4 1 Education has changed significantly in the last twenty years. One of the main reasons education has undergone so many changes is because of technological development. In 1990, computers and other forms of technology served a minimal role in the classroom. Today, many if not most college students attend class with a laptop. I am writing about some of the biggest advantages technology gave to education. Technology has made research much easier. Before online Encyclopedias, Google Scholar, JSTOR, and other online research tools were available, students were forced to spend numerous hours in the library. With the new tools, students can conduct research faster in the comfort of their homes. With Google and other search engines, students can find relevant information faster and more efficiently. Also, there is no more need for intensive memorization as information is more readily available. New also technology allows for a faster, more efficient, and more interactive classroom experience. With Powerpoint presentations and projectors, there is no need for blackboards and whiteboards. With clickers, students can take quizzes during the classroom. These developments also help improve tutoring services. Online tutoring programs are becoming available. One-on-one in-home tutoring programs are also being aided these developments. Tutors...
Words: 11323 - Pages: 46
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17
...The Use of Information Technology to Enhance Management School Education: A Theoretical View Author(s): Dorothy E. Leidner and Sirkka L. Jarvenpaa Source: MIS Quarterly, Vol. 19, No. 3, Special Issue on IS Curricula and Pedagogy, (Sep., 1995), pp. 265-291 Published by: Management Information Systems Research Center, University of Minnesota Stable URL: http://www.jstor.org/stable/249596 Accessed: 15/04/2008 11:44 Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at http://www.jstor.org/action/showPublisher?publisherCode=misrc. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. JSTOR is a not-for-profit organization founded in 1995 to build trusted digital archives for scholarship. We enable the scholarly community to preserve their work and the materials they rely upon, and to build a common research platform that promotes the discovery and use of these resources. For more information...
Words: 14396 - Pages: 58
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...Knowledge Management and Organizational Learning at Turner Construction Co. By Emma Skogstad How does Turner Construction Co., a partner in APQC’s Integrating Knowledge Management and Organizational Learning study and the largest commercial builder in the United States with 6,000 employees and offices in almost every major city across the country, ensure its employees have access to the training and tacit knowledge they need to perform their jobs? According to James Mitnick, a senior vice president at Turner, the organization focuses on performance-based learning. Performance, he says, is where learning, knowledge, and collaboration intersect. The Turner knowledge network is the enabler that brings those three components together to drive performance. The philosophy of the Turner knowledge network is: “to provide access to learning and knowledge across the company in a consistent and organized format to assist in the development, recruitment, and retention of staff.” History of the Turner Knowledge Network In 1999 Turner was acquired by Hochtief AG1, a German-based construction services provider. At the time, Turner’s new chairman, Tom Leppert, approached Mitnick with a vision for expanding the organization by aligning the learning and business strategies. Leppert believed this alignment was necessary to achieve the growth goals he set out for the organization: to expand by 15 to 20 percent each year--meaning the organization would have to add between 500 to 1,000 new engineers...
Words: 2564 - Pages: 11