Nov 13, 2019  
2018-2019 Course Catalog 
    
2018-2019 Course Catalog [ARCHIVED CATALOG]

[Add to Portfolio]

INF 310 - Informatics Security

Credits: 3
Lecture Hours: 3
Lab Hours: 0
Practicum Hours: 0
Work Experience: 0
Course Type: Voc/Tech
This course will enable students to evaluate and conceptualize an area of specialization to consider the topics from their perspective of security. Vulnerabilities that combine standard hardware and software configurations will be examined because they illuminate both security and computer networks. Operating systems and file systems are examined from the perspective of access control, permissions and availability of system services.
Prerequisite: INF 110  
Competencies
  1. Define inforamtion technology security and the need for it.
    1. Describe essential IT security terminology.
    2. Explain what it means to harden security.
    3. List examples of cyber crime.
  2. Discuss basic information technology security procedures.
    1. Describe the importance of security, even in daily routines.
    2. Outline the step to harden your operating system and deploy patches.
    3. Explain the importance of creating strong passwords.
  3. Discuss the essential elements of desktop security.
  4. Explain how to transfer, share, hide, encrypt, back up, and restore files.
  5. Discuss the importance of administering Windows securely.
    1. Explain how to administer Windows securely using the Event Viewer, enabling auditing, and reading the logs.
    2. Describe the structure of the Windows Registry and how to back up and restore it.
    3. Explain how to use common built-in commands to administer Windows.
  6. Discuss security threats and different kinds of attacks.
    1. Explain social engineering and phishing.
    2. Explain how viruses work including Trojans and Worms.
    3. Explain how malware works including Spyware and Adware.
    4. Explain how Keyloggers work including software and hardware.
    5. Explain what a denial of service attack is and how it can affect information systems.
    6. Identify different techniques for Spamming and explain why it can be harmful to information systems.
    7. Identify both positive and negative use of Port Scanners.
    8. Explain how Password crackers work and identify both positive and negative uses for them.
  7. Outline guidelines for Incident response.
    1. Define an incident response.
    2. Recall how to respond to different incidents.
  8. Discuss what Secure Internet Access means.
    1. Explain how to restrict access to specific internet sites.
    2. Define cookies and explain how to deal with them.
    3. Provide some guidelines on how to use P2P networks securely.
  9. Discuss how employees and customers working on the Internet can effect information systems.
    1. Describe how to wrok safely in Web-based and mail client e-mail systems.
    2. Explain how to transact business safely.
    3. Provide some general guidelines to communicate safely via the internet including the use of mobile devices.
  10. Identify an area of specialization and discuss how security can affect its information systems.
    1. Research and report security threats and vulnerabilities related to an area of specialization.
    2. Identify hardware that can be used to protect against security threats and vulnerabilities related to an area of specialization.
    3. Identify software that can be used to protect against security threats and vulnerabilities related to an area of specialization.
    4. Develop a plan to protect against security threats and vulnerabilities related to an area of specialization the plan must include both hardware and software.
    5. Develop an incidence response plan to related security threats and vulnerabilities related to an area of specialization.



[Add to Portfolio]