ISM 4323 - Security Essentials
College of Computer & Information Technology
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Summer 2021 (590)
Requisites
Admission to Technology Development and Management (Bachelor of Applied Science) (TMGT-BAS) or
Admission to Health Services Administration (Bachelor of Applied Science) (HSA-BAS) or
Admission to Cybersecurity (Bachelor of Applied Science) (CYSEC-BAS)
Admission to Health Services Administration (Bachelor of Applied Science) (HSA-BAS) or
Admission to Cybersecurity (Bachelor of Applied Science) (CYSEC-BAS)
Course Description
Basic understanding of network, database and application principles is suggestedThis course includes the study of security issues: access control, authentication, authorization, and non-repudiation as well as network security, platform security, data and file security, virus detection and management, scam control and security administration. Also included are support technologies and tools such as: security gateways, firewall, certification authorities, and Public Key Identifiers (PKI) services.
Learning Outcomes and Objectives
- The student will demonstrate an understanding of security tools used in the identification and detection of security threats by:
- recognizing and applying industry-accepted tools and techniques.
- discussing benefits and risks of security tools and techniques.
- listing the benefits of various tools.
- differentiating the relative strengths and weaknesses of various tools.
- The student will demonstrate an understanding of security principles used in assisting organization in security improvement by:
- describing processes used to develop security assessments.
- describing organizational components and identification of security improvement opportunities.
- defining the security requirements in modern organizations.
- The student will develop an awareness of security issues and concerns for organizations by:
- identifying the different kinds of physical and logical threats to organizations.
- comparing and contrasting industry security models.
- discussing how to identify and address security issues.
- reviewing current trends and techniques in addressing security issues.
- The student will become familiar with identification vs. authentication and pre and post authorization by:
- identifying the different techniques for pre and post authorization.
- comparing and contrasting pre and post authorization in a variety of contexts.
- reviewing emerging technology for identification and authentication.
Criteria Performance Standard
Upon successful completion of the course the student will, with 70% accuracy, demonstrate mastery of the above stated objectives through classroom measurements developed by individual course instructors.
History of Changes
C&I 4/22/03, BOT 5/20/03,
Effective 20031.
Online 20032.
C&I 10/12/04, BOT 11/1604, effective 20042 (0345).
3 Year Review 2008
C&I Approval: 03/23/2010, BOT Approval: 04/21/2010, Effective Term: Summer 2010 (425).
C&I Approval: , BOT Approval: , Effective Term: Fall 2020 (580).
C&I Approval: , BOT Approval: , Effective Term: Summer 2021 (590)
Related Programs
- Cybersecurity (CYSEC-BAS) (610) (Active)
- Health Services Administration (HSA-BAS) (655) (Active)
- Technology Development and Management (TMGT-BAS) (625) (Active)
