Fundamentals of IT Security

Class

An introduction to information security including vocabulary and terminology, ethics, the legal environment, and risk management. Identification of exposures and vulnerabilities and countermeasures are addressed. The importance of appropriate planning, policies and controls is also discussed.

End of Course Outcomes

Outline best practices for the information security goals of confidentiality, integrity and availability; explain ethical practices; and define vocabulary/terminology related to information security.

Student Learning Outcomes

Learning Outcomes Upon successful completion of this course, students will:

 

Lab Fee
$24
Required Textbooks

WHITMAN    PRINCIPLES OF INFO.SECURITY    9780357506431    7TH 21    CENGAGE L

ISBN-13
9780357700006
Evaluation Standards

At the beginning of the semester, instructors will provide each student with a course syllabus and an outline of the course which includes departmental requirements and the specific requirements of the individual instructor. The grade for the course is weighted as follows:

The individual instructor will determine weight of major exams, discussions, and quizzes.

90 – 100 = A
80 - 89 = B
70 - 79 = C
60 – 69 = D
Below 60 = F

 

Program Learning Outcomes

Information Technology AAS – Cyber Security Option

This degree gives students substantial knowledge of techniques required for network and information security assurance. Students work with desktop programs, client-server applications, virtual platforms, and cloud services. Students will detect and report complex security events, create incident detection and analysis tools through programming techniques and procedures, using appropriate languages and software.

The primary emphasis of the curriculum is hands-on training in information assurance for network hardware, software, and data, including physical security, backup procedures, relevant tools, encryption, and incident handling and reporting. Instruction will also include related computer areas that provide the ability to adapt as information systems evolve.

Students who successfully complete the program should qualify for employment in business, industry, and government organizations in such positions as Network Security Analyst; Information Security Analyst; Penetration Tester; Security Systems Analyst; Cybersecurity Analyst; Cyber Incident Analyst; and Cyber Security - Incident Responder.

Disabilities

ADA Statement:

Any student with a documented disability (e.g. learning, psychiatric, vision, hearing, etc.) may contact the Office on the Weatherford College Weatherford Campus to request reasonable accommodations. Phone: 817-598-6350 Office Location: Office Number 118 in the Student Services Building, upper floor. Physical Address: Weatherford College 225 College Park Drive Weatherford, TX.

Academic Integrity

Academic Integrity is fundamental to the educational mission of Weatherford College, and the College expects its students to maintain high standards of personal and scholarly conduct. Academic dishonesty of any kind will not be tolerated. Academic dishonesty includes, but is not limited to, cheating on an examination or other academic work, plagiarism, collusion, and the abuse of resource materials including unauthorized use of Generative AI. Departments may adopt discipline specific guidelines on Generative AI usage approved by the instructional dean. Any student who is demonstrated to have engaged in any of these activities will be subject to immediate disciplinary action in accordance with institutional procedures.

Hope Statement

Any student who faces challenges securing basic resources such as food, clothing, or housing and believes this may affect their performance in their course of study is urged to contact the Director of Student Resources, Dr. Deborah Cregger, for support at (817) 598-6444. Her office is on the first floor of Student Services. If the student prefers, they may contact their instructor, who can reach out on their behalf. Weatherford College also provides the Coyote Pantry. The Pantry maintains boxed and canned foods for students in need. The location of the Coyote Pantry is two blocks west of the Weatherford campus at the Baptist Student Ministry (118 E. Park Ave., Weatherford). Pantry hours are Mon-Thurs. 8:30 am-4:30 pm and Fri. 8.30 am-12:00 pm (817-599-6586).

Student Intellectual Property Rights

A student shall retain all rights to work created as part of instruction or using College District technology resources.

SCANS

The Secretary’s Commission on Achieving Necessary Skills (SCANS) identified competencies in the area of Resources, Interpersonal, Information, Systems, and Technology; and foundation skills in the areas of Basic Skills and Personal Qualities.

WORKPLACE COMPETENCIES -- Effective workers can productively use:

  • Resources -- They know how to allocate (C1) time
  • Information -- They can (C5) acquire and evaluate data, (C6) organize, and maintain files, and (C8) use computers to process information.
  • Interpersonal Skills -- They can work on (C9) teams, and (C14) work well with people from culturally diverse backgrounds.
  • Systems -- They (C15) understand social, organizational, and technological systems; (C16) they can monitor and correct performance; and (17) they can design or improve systems.
  • Technology -- They can (C18) select equipment and tools, (C19) apply technology to specific tasks, and (C20) maintain and troubleshoot equipment.

FOUNDATION SKILLS -- Competent workers in the high-performance workplace need:

 

  • Basic Skills -- (F1) reading, (F2) writing, (F3) arithmetic and (F4) mathematics, and (F5) listening
  • Thinking Skills -- (F8) to make decisions, (F9) to solve problems, (F10) to visualize, and (F12) to reason.
  • Personal Qualities -- (F13) individual responsibility, (F14) self-esteem, (F15) sociability, (F16) self-management, and (F17) integrity
Contact Hours
96
SCH Hours
3
Work Hours
0
Revised
Spring 2024