CTS 2120C - Security+: Syllabus

Updated January 2016

CTS2120C           
   Security +
Ref# 543392

Table of Contents

Faculty Contact Information Methods of Instruction
Course Description Pace Chart and Assignments
General Course Outcomes Course Progress and Evaluation Policy
Course Prerequisites Communication Policy
Course Attendance & Participation Policy Other Policies and Procedures
Computer Requirements Student Success Tips and Resources
Required Course Materials  

Faculty Contact Information

Course Instructor:   Prof xxxxxxxx
Office Phone:   954-201-xxxx
Department Phone:   954-201-xxxx
Email:   All communication should be through the course email tool. Use my BC email ONLY if you are unable to access the course email: abc@broward.edu
Virtual Office Hours:   I am always available if you need to speak over the phone if you need my help.  Simply send me an email with your number and a good time to call.
BC Safety Office Phone#:   954-201-HELP (4357)

Return to Table of Contents

Course Description

This course provides the student with an understanding of the computer, network, infrastructure, and information security issues faced by industry worldwide. Expertise necessary to combat and protect intellectual property from theft and destruction are also developed. The skills developed by students who complete this course will prepare them for the Security+ certification exam.

Return to Table of Contents

General Course Outcomes

Section 1

  1. Explain the security function and purpose of network devices and technologies
  2. Apply and implement secure network administration principles
  3. Distinguish and differentiate network design elements and compounds
  4. Implement and use common protocols
  5. Identify commonly used default network ports
  6. Implement a wireless network in a secure manner
  7. Explain risk related concepts
  8. Carry out appropriate risk mitigation strategies
  9. Execute appropriate incident response procedures
  10. Provide security evaluation and assistance to the organization (e.g., product evaluation, data flow management)
  11. Explain the importance of security related awareness and training
  12. Compare and contrast aspects of business continuity
  13. Explain the impact and proper use of environmental controls
  14. Exemplify the concepts of confidentiality, integrity, and availability (CIA)
  15. Analyze and differentiate among types of attacks
  16. Analyze and differentiate among types of social engineering attacks
  17. Analyze and differentiate among types of wireless attacks
  18. Analyze and differentiate among types of mitigation and deterrent techniques
  19. Implement assessment tools and techniques to discover security threats and vulnerabilities
  20. Explain the importance of application security
  21. Carry out appropriate procedures to establish host security
  22. Explain the importance of data security
  23. Explain the function and purpose of authentication services
  24. Explain the fundamental concepts and best practices related to authentication, authorization, and access control
  25. Implement appropriate security controls when performing account management
  26. Summarize general cryptography concepts
  27. Use and apply appropriate cryptographic tools and products
  28. Explain the core concepts of public key infrastructure
  29. Implement PKI, certificate management, and associated components

Section 2

  1. Explain the security function and purpose of network devices and technologies
  2. Apply and implement secure network administration principles
  3. Distinguish and differentiate network design elements and compounds
  4. Implement and use common protocols
  5. Explain Risks associated to Cloud Computing and Virtualization
  6. Carry out appropriate risk mitigation strategies
  7. Explain the importance of security related awareness and training
  8. Execute disaster recovery plans and procedures
  9. Analyze and differentiate among types of malware
  10. Analyze and differentiate among types of attacks
  11. Analyze and differentiate among types of application attacks
  12. Analyze and differentiate among types of mitigation and deterrent techniques
  13. Implement assessment tools and techniques to discover security threats and vulnerabilities
  14. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
  15. Explain the importance of application security
  16. Carry out appropriate procedures to establish host security
  17. Explain the importance of data security
  18. Explain the fundamental concepts and best practices related to authentication, authorization, and access control
  19. Implement appropriate security controls when performing account management
  20. Use and apply appropriate cryptographic tools and products

Return to Table of Contents

Course Prerequisites

To maximize your chances for success in this course, make sure that you meet the following course course prerequisites:

Return to Table of Contents

Course Attendance and Participation Policy

Attendance/Withdrawal Policy:

During the first week of class, you must complete the Course Challenge Assessment or else you will be administratively withdrawn from the course. Simply logging into the course will not satisfy your attendance during this time. As with on-campus courses, students who are reported for non-attendance in an online course and are withdrawn are still responsible for paying for the course. If you do not complete the requirements of the first week of class, you should drop the course by the official drop/add deadline or expect to pay for the course.

It is very important for you to actively participate in this online class. Students will have a maximum of 16 weeks to complete this course from the first day of registration. If the entire course, including all unit evaluations, is not completed by the last day of the 16th week students will receive a U for the course.

Students must obtain the permission of their Academic Coach to go beyond 16 weeks in the course.

Participation:

Regular, active, and meaningful participation is a critically important component of this course and is essential to your success. It is recommended that you log into the course several times during the week. Frequency and quality of participation may affect your success in the program.

Return to Table of Contents

Computer Requirements

To complete this course, you must have access to computer hardware and software that meets the standards listed below.

System and Software Requirements for this course 
Operating System​

PC

Windows XP, Vista, 7 or 8
Windows 8 recommended

Browser​ ​Firefox 20.0 or higher, latest recommended
Internet Explorer 9.0 or higher
Download version 10 (recommended)
Firefox 20.0 or higher, latest recommended
JAVA​ ​Java 7.0.x update 21
Download version 7.0 update 21 (recommended)
​Java SE 6.0 update 26
Download 1.6.0_26 (recommended)
The following are true for both PC and Mac​
​ ​
​Internet ​Cable modem or DSL
RAM 2 GB, 4 GB preferred​ ​
Processor ​2.0 GHz or higher ​ ​
Video​ ​SVGA monitor with minimum resolution of 1024 x 768, with 1280 x 1024 or greater recommended
JavaScript ​ ​Enabled
Cookies​ ​Enabled
Software Requirements for successful completion of this course.

 

Return to Table of Contents

Required Course Materials

Required:

Title: TextOut's LabSim for PC Pro Security+ CompTIA SYO-401
Author: TestOut
ISBN: 978-1-935080-44-2

TestOut's LabSimSecurity Pro. Is our most comprehensive Security courseware to date. With over 60 lab simulations, LabSim for Security Pro will give you the knowledge and the experience you need to enter the industry as an entry-level IT security administrator.

What's Included:

Where to Purchase:

You can purchase an access code from the Broward College Central Campus bookstore or you can purchase online directly from TestOut Student Purchasing using code 14-232TA to get the discount.

A. Hugh Adams Central Campus Bookstore
Admissions & Student Service Center - Bldg. 19
3501 SW Davie Road
Davie, Florida 33314-1604
Tel: (954) 201-6830
Fax: (954) 201-6895

How to Create an Account:

After you purchase an access code you can create an account by following the instructions located @ TestOut Quick Start Guide.

There are also instructional videos that guide you through the process @ How-To Tutorials.

Here are some Product FAQs

 

Return to Table of Contents

Methods of Instruction

This is a 3-credit hour fully online course. Normally, a 3-credit hour on-campus course would meet two times each week (during a 16 week term) for a total of 3 hours per week or 48 hours per term. This is a self paced fully online course so students will have to guide themselves accordingly. There is a pace chart included below that will show you how to successfully complete this course in a 4 week period.

Read and refer to this document regularly. It will tell you what assignments you should complete, and how to complete them.

Return to Table of Contents

Pace Chart - 4 week completion goal

Purpose

The purpose of this Pace Chart is to give students in this course an indication of how long they will on average spend to complete this course. This Pace Chart is only a guideline and depending on a students' proficiency with computers, learning style, prior knowledge of the subject and personal motivation, actual times may differ widely from the guidelines given.

Entire Course

The entire course should be completed within a sixteen (16) week time frame. Students who can demonstrate competencies faster than the recommended time could complete the course in a four (4) week period.

Section 1

All modules in section 1 should take at most two (2) weeks assuming at least twelve (12) hours per week are spent on each module.

Section 2

All modules in section 2 should take at most two (2) weeks assuming at least twelve (12) hours per week are spent on each module.

Week/section/Learning Outcomes Learning Materials Assignments & Assessments
Week 1/section 1    
Course Challenge    
Upon successful completion of this section, the student shall be able to:

Module 1.0 Security Overview

  1. Exemplify the concepts of confidentiality, integrity, and availability (CIA)

Module 2.0 Access Control Models

  1. Apply and implement secure network administration principles
  2. Distinguish and differentiate network design elements and compounds
  3. Explain risk related concepts
  4. Analyze and differentiate among types of attacks
  5. Carry out appropriate procedures to establish host security
  6. Explain the function and purpose of authentication services
  7. Explain the fundamental concepts and best practices related to authentication, authorization, and access control
  8. Implement appropriate security controls when performing account management
Module 3.0 Cryptography
  1. Explain the importance of data security
  2. Summarize general cryptography concepts
  3. Use and apply appropriate cryptographic tools and products
  4. Explain the core concepts of public key infrastructure
  5. Implement PKI, certificate management, and associated components
Complete content for modules 1-3 Complete practice quizzes, labs and discussions for Modules 1-3
Week 2/Section1    
Upon successful completion of this section, the student shall be able to:

Module 4.0 Policies, Procedures and Awareness

  1. Explain risk related concepts
  2. Carry out appropriate risk mitigation strategies
  3. Execute appropriate incident response procedures
  4. Provide security evaluation and assistance to the organization (e.g., product evaluation, data flow management)
  5. Explain the importance of security related awareness and training
  6. Compare and contrast aspects of business continuity
  7. Analyze and differentiate among types of attacks
  8. Analyze and differentiate among types of social engineering attacks
  9. Implement assessment tools and techniques to discover security threats and vulnerabilities
  10. Explain the importance of application security

Module 5.0 Physical Security

  1. Distinguish and differentiate network design elements and compounds
  2. Carry out appropriate risk mitigation strategies
  3. Explain the impact and proper use of environmental controls
  4. Analyze and differentiate among types of mitigation and deterrent techniques
  5. Carry out appropriate procedures to establish host security
  6. Explain the importance of data security
  7. Explain the fundamental concepts and best practices related to authentication, authorization, and access control

Module 6.0 Perimeter Defenses

  1. Explain the security function and purpose of network devices and technologies
  2. Apply and implement secure network administration principles
  3. Distinguish and differentiate network design elements and compounds
  4. Implement and use common protocols
  5. Identify commonly used default network ports
  6. Implement a wireless network in a secure manner
  7. Analyze and differentiate among types of attacks
  8. Analyze and differentiate among types of wireless attacks
  9. Implement assessment tools and techniques to discover security threats and vulnerabilities
  10. Explain the function and purpose of authentication services
  11. Use and apply appropriate cryptographic tools and products
Complete content for modules 4 - 6 Complete practice quizzes, labs and discussions for Modules 4-6
section 1 evaluation    
Week 3/section 2    
Upon successful completion of this section, the student shall be able to:

Module 7.0 Network Defenses

  1. Explain the security function and purpose of network devices and technologies
  2. Apply and implement secure network administration principles
  3. Distinguish and differentiate network design elements and compounds
  4. Implement and use common protocols
  5. Explain risk related concepts
  6. Carry out appropriate risk mitigation strategies
  7. Analyze and differentiate among types of malware
  8. Analyze and differentiate among types of mitigation and deterrent techniques
  9. Implement assessment tools and techniques to discover security threats and vulnerabilities
  10. Implement appropriate security controls when performing account management

Module 8.0 Host Defenses

  1. Apply and implement secure network administration principles
  2. Implement and use common protocols
  3. Carry out appropriate risk mitigation strategies
  4. Explain the importance of security related awareness and training
  5. Analyze and differentiate among types of malware
  6. Analyze and differentiate among types of mitigation and deterrent techniques
  7. Carry out appropriate procedures to establish host security
  8. Explain the fundamental concepts and best practices related to authentication, authorization, and access control
  9. Implement appropriate security controls when performing account management
Complete content for modules 7 - 8 Complete practice quizzes, labs and discussions for Modules 7-8
Week 4/Section 2    

Upon successful completion of this section, the student shall be able to:

 Module 9.0 Application Defenses

  1. Explain the security function and purpose of network devices and technologies
  2. Distinguish and differentiate network design elements and compounds
  3. Risks associated to Cloud Computing and Virtualization
  4. Carry out appropriate risk mitigation strategies
  5. Explain the importance of security related awareness and training
  6. Analyze and differentiate among types of attacks
  7. Analyze and differentiate among types of application attacks
  8. Analyze and differentiate among types of mitigation and deterrent techniques
  9. Explain the importance of application security
  10. Carry out appropriate procedures to establish host security
  11. Use and apply appropriate cryptographic tools and products

Module 10.0 Data Defenses

  1. Distinguish and differentiate network design elements and compounds
  2. Implement and use common protocols
  3. Explain risk related concepts
  4. Execute disaster recovery plans and procedures
  5. Explain the importance of data security
  6. Use and apply appropriate cryptographic tools and products

Module 11.0 Assessments and Audits

  1. Explain the security function and purpose of network devices and technologies
  2. Apply and implement secure network administration principles
  3. Carry out appropriate risk mitigation strategies
  4. Analyze and differentiate among types of mitigation and deterrent techniques
  5. Implement assessment tools and techniques to discover security threats and vulnerabilities
  6. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
Complete content for modules 9 - 11 Complete practice quizzes, labs and discussions for Modules 9-11
section 2 evaluation    

 

 

Return to Table of Contents

Course Progress and Evaluations Policies

Assessment

S/U

Course Evaluation

Student will need to score 81% or higher on unit evaluation to obtain an S for the course

Grading Scale

Grades

Percentage

Grade = S

81-100+%

Grade = U

0-80%

Return to Table of Contents

Communication Policy

Expectations for Course Communication

Return to Table of Contents

Other Policies and Procedures

Special Needs - Students having special needs as defined by the Americans with Disabilities Act should:

Academic Honesty

Critical Event Procedure

Logging Off

Changes to the Syllabus

Lab Safety (if applicable)

24/7 Helpdesk Information

Return to Table of Contents

Student Success Tips

In order to be successful in this course, you need to be organized and manage your time well so that you can complete all assignments and assessments in a timely manner. Make sure that you do not allow yourself to procrastinate, and that you communicate with the instructor or your classmates via the Course Cafe if you have any questions on any course materials or need assistance completing any assignments.

Online Resources for Students

Return to Table of Contents

U.S. Department of Labor Disclaimer

This product was funded by the U.S. Department of Labor’s Employment and Training Administration. This product  was created by the grantee and does not necessarily reflect the official position of the U.S. Department of labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability, or ownership

Creative Commons License
Except where otherwise noted, this work is licensed under a Creative Commons Attribution 4.0 International License.

The Academic Use of Textbook Material Disclaimer

The material contained in this course uses direct excerpts from the required textbook for this course:

Title: TextOut's LabSim for PC Pro Security+ CompTIA SYO-401
Author: TestOut
ISBN: 978-1-935080-44-2

The use of this material is authorized under the publisher's academic use license which requires the user to purchase the required textbook.