Maricopa Community Colleges  ITS100   20046-20055 
Official Course Description: MCCCD Approval: 06/22/04
ITS100 20046-20055 LEC 2 Credit(s) 2 Period(s)
Information Security Awareness
Computer and network security topics, including network communication. Includes security policy, implementation of basic security measures, the importance of backups and the value of protecting intellectual property. Real-life examples and practical projects to reinforce the need for computer security. Prerequisites: None.
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
ITS100   20046-20055 Information Security Awareness
1. Define information security. (I)
2. Describe the different types of information security attackers and attacks that can occur. (I)
3. Identify different security techniques available (II)
4. Describe various methods of implementing security on computers. (II)
5. List the criteria used to develop and implement a security policy in a personal or business setting. (III)
6. Identify the components of a business continuity plan. (III)
7. Describe risks associated with accessing the internet and using e-mail programs. (IV)
8. List preventive measures used to minimize attacks with internet and e-mail programs. (IV)
9. Discuss types of network attacks and appropriate techniques used to enhance network security perimeters. (V)
10. Describe the challenges to make a computer secure including the methods available to help reduce the risks of an attack. (VI)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
ITS100   20046-20055 Information Security Awareness
    I. Introduction to Information Security
        A. Why information security is important
          1. Preventing data theft
          2. Protecting intellectual property
          3. Thwarting identity theft
          4. Avoiding legal consequences and foiling cyber terrorism
        B. Attacker profiles and methods of attack
        C. Methods of safeguarding a computer system
      II. Computer Security
          A. Physical security protection methods
          B. Data security protection methods
          C. Operating system security protection methods
        III. Security Management
            A. Security policy development components
            B. Human resource procedures
            C. Business continuity plan components
          IV. Internet Security
              A. Web attacks and web security techniques
              B. E-mail vulnerabilities and solutions
            V. Network Security - How Networks Work
                A. Devices on a network and how data is transmitted
                B. Different types of network attacks
                C. Network defenses available
                D. Wireless network components and security
              VI. Overall Security Awareness
                  A. Security challenges - developing a philosophy and taking action
                  B. Keeping vigilant - know the enemy and joining with allies
                  C. Resisting Attacks
                    1. How to respond to an attack as an organization or a home user
                    2. Preservation of evidence
              Go to Description    Go to top of Competencies    Go to top of Outline