...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...STUDENT COPY The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. ------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized...
Words: 5558 - Pages: 23
...Higher Education Division Unit of Study Outline HBM222/HBM350N Marketing Planning Semester 1, 2012 Version 1 (19 February, 2012) Table of contents Unit of Study Outline 4 Teaching Staff 4 Unit Aims. 4 Learning Objectives 5 Content 5 Learning and Teaching Structure 5 Lecture Program (Provisional Schedule) 6 Tutorial Guide 7 Resources and Reference Material 8 Assessment 9 a. Assessment Task Details: 9 b. Participation Requirements - Tutorials 9 c. Minimum Requirements to pass this Unit of Study: 9 NB - Your final mark will be the sum of the marks gained in all pieces of assessment noting that to pass this unit you must achieve at least 50% in the final exam. 10 If you score between 43% and 49% in the final exam your maximum mark will be 46%. 10 If a student scores less than 43% in the final exam, your maximum final mark will be 42%. 10 d. Assessment Criteria: 10 f. Extensions and Late Submissions: 11 g. Assessment Results: 11 h. Groupwork Guidelines: 11 i. Email Communication 12 j. Plagiarism: 12 k. Assessment and Appeals Policy and Procedure 12 Ethical Conduct at Swinburne 12 Blackboard Site for this Unit of Study 13 Student Feedback: 13 Safety Standards and Conduct Requirements: 13 Special Needs 14 Appendix 1 - Guidelines for Minor Assignment (situation analysis) 15 Appendix 2 - Marking Guide for Minor Assignment 16 Appendix 3 - Guidelines for Major Assignment (Marketing Plan) 17 Appendix 4 - Major Assignment (Marketing Plan) Marking...
Words: 6513 - Pages: 27
...INSTITUTE SC4730 Environmental Science Onsite Course GRADED ASSIGNMENTS ------------------------------------------------- Assignments and Exercises………………………………………………………… page 2 Labs…………………………………………………………………………………….page 16 Project…...............................................................................................................page 21 ------------------------------------------------- Graded Assignments Unit 1 Exercise 1: Statistics and Graphing Course Objectives and Learning Outcomes In this assignment, you will interpret and graph descriptive statistics. Assignment Requirements Work in small groups to complete Problems 1-4 given in the worksheet provided by your instructor (Problems Worksheets). This is also available at the link below. Fill out one activity sheet (found at the end of the document) for each of the 4 questions. Required Resources * Statistics and Graphing (SC2730.U1.HO1) Worksheets also available at: http://esa21.kennesaw.edu/activities/stats/stats.pdf * Problems Worksheets (SC2730.U1.HO2) also available at: http://esa21.kennesaw.edu/activities/stats/problems.pdf Submission Requirements 4 completed activity sheets (1 each for Problems 1-4) Unit 1 Problem Set 1: Scientific Method Applied Problem Sets Course Objectives and Learning Outcomes In this assignment, you will outline the steps of the scientific method. Assignment Requirements Refer to the Applied Problem Sets located on pp. 153-162...
Words: 5239 - Pages: 21
...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...
Words: 1834 - Pages: 8
...functioning organization. In order to facilitate your learning in this course, a course project that allows you to research various HR functions at an organization of your choice has been developed. You can then practically apply the information you have learned to the chosen environment. The organization you select should be of interest to you. It can be where you are currently employed, or wish to be employed. It can also be something that interests you (for example, coffee drinkers can select Starbucks). This must be an organization that is researchable as you need to gather and analyze a variety of information in order to complete the components of your project. If you select an organization with which you are currently associated, it is important to remember that the various analyses you make during the completion of your project must be based on facts that can be documented rather than your personal opinion as an employee. Each project component requires you to research a different aspect of HRM. In addition to gathering the requisite data from the organization of your choice, you are required to research and employ a minimum of four resources (per assignment) to support the content of each assignment. Examples of acceptable choices include informational interviews, scholarly journals, and white papers from professional organizations such as the Society for Human Resource Management (SHRM). As you progress through the project and address the different HR issues covered...
Words: 2438 - Pages: 10
...Science and Engineering Technology Centre for the Built Environment PROJECT MANAGEMENT- ENVIRONMENT GRADUATE CERTIFICATE 1 Today’s Agenda • • • • • Review and case assignments for Tutorial 1 due today Textbook status Cover material for Tutorial 2 Begin to work on review and case assignments for Tutorial 2 Next week: complete review and case assignments for Tutorial 2 • Tutorial 2 assignments are due next Monday, January 28 2 Tutorial 2: Creating a Project Schedule Microsoft Project 2010 ® In Tutorial Section 2.1 you will: • • • • • • Start a new project Examine scheduling defaults Change a project and task calendar Enter and edit tasks and durations Enter and edit recurring tasks and milestones Enter lag and lead times New Perspectives on Microsoft Project 2010 4 In Tutorial Section 2.2 you will: • • • • • • Enter and edit task dependencies View project statistics Show the project summary Review project statistics Create and manipulate summary tasks Develop a work breakdown structure New Perspectives on Microsoft Project 2010 5 Scheduling • By default, the new project file is scheduled from a project Start date • All tasks are scheduled to begin as soon as possible • Project 2010 calculates the project’s Finish date based on the: – Tasks – Durations – Dependencies New Perspectives on Microsoft Project 2010 6 Project Information Dialog Box New Perspectives on Microsoft Project 2010 7 Scheduling a Project from a Finish...
Words: 3213 - Pages: 13
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17
...Donell Jones NT2580 Unit 2 Assignment 2: Microsoft Environment Analysis 5 vulnerabilities for this workgroup LAN based on the Microsoft Security Advisories numbers. 2755801, 2719662, 2854544, 2846338, 2847140. 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. Three vulnerabilities and Solutions related to client configurations. Advisory Number: 2719662 Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative...
Words: 571 - Pages: 3
...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...
Words: 4296 - Pages: 18
...BCO1102 Information Systems for Business 2014 Semester 1 Prepared by Paul Darbyshire Prepared by Paul Darbyshire Welcome Welcome to BCO1102 Information Systems for Business for Semester 1, 2014. For the vast majority of you it will be a compulsory unit of study as it is part of the Business Core in all undergraduate Bachelor of Business degrees. The major focus of this unit is on how computer- based information systems can support decision making in organizations and businesses. Those decisions often need to be made by professionals who come from discipline areas you are studying such as accounting, management, information systems or marketing. One of the most important elements of an information system is people, so all of us need to know what role we can play and what role information and communication technologies (ICT) can play in supporting decisions. This unit will look at the theoretical side of information systems as well as personal productivity tools such as spread sheets and databases. In addition we will look at global trends in information systems and in particular the emerging use of Cloud Computing and Social Networking, which is sometimes called Web 2.0. The unit of study requires the textbook Introduction to Information Systems by Rainer, Prince and Cegielski 5th Edition. The textbook is used for the theory and some of the practical work in tutorials. All reading for this subject during the semester is assigned from this textbook. Feedback from previous...
Words: 3033 - Pages: 13
...Microsoft and the Xbox 360 Ring of Death ------------------------------------------------- Table of Contents Executive Summary ...................................................................................................................... 3 Problem Statement .......................................................................................................................4 Situation Analysis ..........................................................................................................................4 Objectives ..............................................................................................4 Background ............................................................................................5 SWOT Analysis ..............................................................................................................................6 Strengths ...............................................................................................6 Weaknesses ...........................................................................................7 Opportunities .........................................................................................8 Threats................................................................................................... 8 Market Analysis ............................................................................................................................9 Previous Market...
Words: 7018 - Pages: 29
...Kaplan AB209 All Discussions Unit 1 In both your Reading and in the Learning Activity you have reviewed the legal forms of business entity. Depending on how your business is set up as a legal business entity affects the financial and long term success of your business. Describe three types of business entities, and describe at least three stakeholders for each one. What are the stakeholders’ interests in each of these business entities? Do any of these stakeholder interests conflict with each other? If so, how? Unit 2 This week you reviewed the employment process in your Learning Activity. Now you will get an opportunity to discuss some of the issues that affect small businesses in this arena. What do you think are the most serious weaknesses in the interviewing process as conducted at many small businesses? How could these be remedied? Are on-line testing and games to screen potential candidates fair in your estimation? Why or why not? Unit 3 This Discussion provides you with an opportunity to apply and discuss the employment process concepts presented in your Reading and Learning Activity. You practiced with the hiring process concepts in the Learning Activity this week. Learning how to apply this process should better prepare you for your current or future management position. Most managers must participate in or are responsible for the hiring process at some point in their jobs. If you run a small business you may have to do all the hiring yourself...
Words: 1363 - Pages: 6
...Unit 1 In both your Reading and in the Learning Activity you have reviewed the legal forms of business entity. Depending on how your business is set up as a legal business entity affects the financial and long term success of your business. Describe three types of business entities, and describe at least three stakeholders for each one. What are the stakeholders’ interests in each of these business entities? Do any of these stakeholder interests conflict with each other? If so, how? Unit 2 This week you reviewed the employment process in your Learning Activity. Now you will get an opportunity to discuss some of the issues that affect small businesses in this arena. What do you think are the most serious weaknesses in the interviewing process as conducted at many small businesses? How could these be remedied? Are on-line testing and games to screen potential candidates fair in your estimation? Why or why not? Unit 3 This Discussion provides you with an opportunity to apply and discuss the employment process concepts presented in your Reading and Learning Activity. You practiced with the hiring process concepts in the Learning Activity this week. Learning how to apply this process should better prepare you for your current or future management position. Most managers must participate in or are responsible for the hiring process at some point in their jobs. If you run a small business you may have to do all the hiring yourself, at least initially. Read the...
Words: 1360 - Pages: 6
... ISBN-13:978-0-07-802532-7. Required Software: Microsoft Word, Microsoft Excel, McGraw Hill Connect subscription Course Description & Objectives This course examines the accounting theory, concepts, and procedures inherent in the preparation of the general-purpose financial statements required of all publicly traded companies. Specifically addressed are the balance sheet, income statement, statement of cash flows, explanatory notes, and the auditor’s opinion. Other areas explored include review of the accounting process, profitability analysis, financial disclosures, and time value of money concepts. IFRS (International Financial Reporting Standards) will be explored in conjunction with each chapter’s GAAP procedures. Prerequisites: BUS 232 – Principles of Managerial Accounting. Upon completion of this course you should be able to: 1. Understand the environment and theoretical structure of financial accounting. 2. Perform the steps in the accounting processing cycle and apply both cash and accrual based accounting. 3. Apply Generally Accepted Accounting Principles in the preparation of the income statement, balance sheet, and statement of cash flows. 4. Determine and prepare required financial disclosures. 5. Perform profitability analysis and income measurement. 6. Apply the concepts of the time value of money to income measurement and profitability analysis. 7. Apply the procedures to account for cash and receivables. 8. Perform...
Words: 774 - Pages: 4