ISM 4323 - Security Essentials

College of Computer & Information Technology

Credit(s): 3
Contact Hours: 47
Effective Term Summer 2021 (590)

Requisites

Admission to Technology Development and Management (Bachelor of Applied Science) (TMGT-BAS) or
Admission to Health Services Administration (Bachelor of Applied Science) (HSA-BAS) or
Admission to Cybersecurity (Bachelor of Applied Science) (CYSEC-BAS)

Course Description

Basic understanding of network, database and application principles is suggestedThis course includes the study of security issues: access control, authentication, authorization, and non-repudiation as well as network security, platform security, data and file security, virus detection and management, scam control and security administration. Also included are support technologies and tools such as: security gateways, firewall, certification authorities, and Public Key Identifiers (PKI) services.

Learning Outcomes and Objectives

  1. The student will demonstrate an understanding of security tools used in the identification and detection of security threats by:
    1. recognizing and applying industry-accepted tools and techniques.
    2. discussing benefits and risks of security tools and techniques.
    3. listing the benefits of various tools.
    4. differentiating the relative strengths and weaknesses of various tools.
  2. The student will demonstrate an understanding of security principles used in assisting organization in security improvement by:
    1. describing processes used to develop security assessments.
    2. describing organizational components and identification of security improvement opportunities.
    3. defining the security requirements in modern organizations.
  3. The student will develop an awareness of security issues and concerns for organizations by:
    1. identifying the different kinds of physical and logical threats to organizations.
    2. comparing and contrasting industry security models.
    3. discussing how to identify and address security issues.
    4. reviewing current trends and techniques in addressing security issues.
  4. The student will become familiar with identification vs. authentication and pre and post authorization by:
    1. identifying the different techniques for pre and post authorization.
    2. comparing and contrasting pre and post authorization in a variety of contexts.
    3. reviewing emerging technology for identification and authentication.

Criteria Performance Standard

Upon successful completion of the course the student will, with 70% accuracy, demonstrate mastery of the above stated objectives through classroom measurements developed by individual course instructors.

History of Changes

C&I 4/22/03, BOT 5/20/03, Effective 20031. Online 20032. C&I 10/12/04, BOT 11/1604, effective 20042 (0345). 3 Year Review 2008 C&I Approval: 03/23/2010, BOT Approval: 04/21/2010, Effective Term: Summer 2010 (425). C&I Approval: , BOT Approval: , Effective Term: Fall 2020 (580).
C&I Approval: , BOT Approval: , Effective Term: Summer 2021 (590)

Related Programs

  1. Cybersecurity (CYSEC-BAS) (610) (Active)
  2. Health Services Administration (HSA-BAS) (655) (Active)
  3. Technology Development and Management (TMGT-BAS) (625) (Active)