Technical Aspects of Computer Security – CSIS 461

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020

Course Description

This course introduces the following issues and principles of information system security: security policies and their mechanisms of implementation, methods used by attackers attempting to circumvent these protections, and specific defenses against these attackers.

Prerequisites

CSCI 355 or CSIS 355

Rationale

As more and more computing systems rely on networking technology, computer security is becoming more important. In addition, the skills to break software and penetrate network defenses are more widely available. As such, what is needed is for students with high moral character to learn the techniques used by attackers, both to test the systems for which they are responsible and also to construct solid defenses to protect against these attacks. This course will teach students these skills, along with the necessary moral and ethical backdrop.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

  1. Apply the knowledge of computing and mathematics appropriate to the discipline of computer security
  2. Demonstrate the ability to analyze the tactics, techniques, and practices of current computer security threats
  3. Demonstrate the ability to use current tools, techniques, and skills necessary to cost-effectively respond to computer security threats
  4. Apply the appropriate mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer security systems
  5. Describe the professional, ethical, legal, and social issues and responsibilities involving secure computing
  6. Apply a biblical worldview to secure computing methods

Course Assignment

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.

Discussion Board Forums (3)

Discussion boards are collaborative learning experiences. Therefore, the student will create a thread in response to the provided prompt for each forum. Each thread must be at least 300 words and demonstrate course-related knowledge. In addition to the thread, the student will reply to the threads of at least 2 classmates. Each reply must be at least 100 words. At least 1 citation must be included in each thread and reply. Current APA formatting is required for any citations.

Computer Security Lab Assignments (5)

Using a virtual lab environment, the student will complete computer security lab assignments that will give him or her an opportunity to demonstrate mastery of the lessons learned during the assigned or previous module/week.

Quizzes (4)

Each quiz will cover the Reading & Study material for the module/week in which it is assigned as well as the preceding modules/weeks. Each exam will be open-book/open-notes and will have a time limit of 45 minutes. Each quiz will contain a variety of multiple-choice and true/false questions.

Final Exam

The student will complete a comprehensive Final Exam which will cover all the material from the course. This exam will be open-book/open-notes, contain a variety of multiple-choice and true/false questions and have a time limit of 2 hours.