Security Assessment and Auditing

Class

Comprehensive experience for the security curriculum. Synthesizes technical material covered in prior courses to monitor, audit, analyze, and revise computer and network security systems that ensure industry specific levels of protection are in place to assure regulatory compliance.

End of Course Outcomes

Upon completion of the course the student will be able to:

Appraise security plan to ensure appropriate level of protection; assess network security design; audit network system based on security design; use relevant tools to assure security requirements; and review security policies and procedures on a regular basis.

Lab Fee
$24
Required Textbooks

Title: CompTIA Security+ Guide to Network Security Fundamentals, 8e 
Author: CIAMPA 
Publisher: Cengage Learning 
Year: 2024

ISBN-13
9798214000664
Evaluation Standards
  • Assignments 35% 
  • Quizzes15% 
  • Project 15% 
  • Exams 35% 

Final grades will be calculated by the following scale:

A: 90% and above
B: 80 to 89%
C: 70 to 79%
D: 60 to 69%
F: less than 60%

Instructional Methods

Lecture, hands-on computer activities, reading and writing assignments, quizzes, and exams. Reading, lab practice, exams, and assignments are accessed and submitted through the Canvas virtual classroom.

Required Materials

Additional requirements for use from home or office:

  • Desktop or Laptop Computer
  • Internet Access
  • Webcam
Program Learning Outcomes

Information Technology AAS – Cyber Security Option 

  • This degree gives students substantial knowledge of techniques required for network and information security assurance.  

  • Students work with desktop programs, client-server applications, virtual platforms and cloud services.  

  • Students will detect and report complex security events, create incident detection and analysis tools through programming techniques and procedures, using appropriate languages and software.  

  • The primary emphasis of the curriculum is hands-on training in information assurance for network hardware, software and data, including physical security, backup procedures, relevant tools, encryption and incident handling and reporting. Instruction will also include related computer areas that provide the ability to adapt as information systems evolve.  

  • Students who successfully complete the program should qualify for employment in business, industry, and government organizations in such positions as Network Security Analyst; Information Security Analyst; Penetration Tester; Security Systems Analyst; Cybersecurity Analyst; Cyber Incident Analyst; and Cyber Security - Incident Responder. 

Disabilities

Any student with a documented disability (e.g. learning, psychiatric, vision, hearing, etc.) may contact the Office on the Weatherford College Weatherford Campus to request reasonable accommodations. Phone: 817-598-6350 Office Location: Office Number 118 in the Student Services Building, upper floor. Physical Address: Weatherford College 225 College Park Drive Weatherford, TX.

Academic Integrity

Academic Integrity is fundamental to the educational mission of Weatherford College, and the College expects its students to maintain high standards of personal and scholarly conduct. Academic dishonesty of any kind will not be tolerated. Academic dishonesty includes, but is not limited to, cheating on an examination or other academic work, plagiarism, collusion, and the abuse of resource materials including unauthorized use of Generative AI. Departments may adopt discipline specific guidelines on Generative AI usage approved by the instructional dean. Any student who is demonstrated to have engaged in any of these activities will be subject to immediate disciplinary action in accordance with institutional procedures.

Hope Statement

Any student who faces challenges securing basic resources such as food, clothing, or housing and believes this may affect their performance in their course of study is urged to contact the Director of Student Resources, Dr. Deborah Cregger, for support at (817) 598-6444. Her office is on the first floor of Student Services. If the student prefers, they may contact their instructor, who can reach out on their behalf. 

Student Intellectual Property Rights

A student shall retain all rights to work created as part of instruction or using College District technology resources.

SCANS

The Secretary’s Commission on Achieving Necessary Skills (SCANS) identified competencies in the area of Resources, Interpersonal, Information, Systems, and Technology; and foundation skills in the areas of Basic Skills and Personal Qualities.

WORKPLACE COMPETENCIES -- Effective workers can productively use:

  • Resources -- They know how to allocate (C1) time
  • Information -- They can (C5) acquire and evaluate data, (C6) organize, and maintain files, and (C8) use computers to process information.
  • Interpersonal Skills -- They can work on (C9) teams, and (C14) work well with people from culturally diverse backgrounds.
  • Systems -- They (C15) understand social, organizational, and technological systems; (C16) they can monitor and correct performance; and (17) they can design or improve systems.
  • Technology -- They can (C18) select equipment and tools, (C19) apply technology to specific tasks, and (C20) maintain and troubleshoot equipment.

FOUNDATION SKILLS -- Competent workers in the high-performance workplace need:

  • Basic Skills -- (F1) reading, (F2) writing, (F3) arithmetic and (F4) mathematics, and (F5) listening
  • Thinking Skills -- (F8) to make decisions, (F9) to solve problems, (F10) to visualize, and (F12) to reason.
  • Personal Qualities -- (F13) individual responsibility, (F14) self-esteem, (F15) sociability, (F16) self-management, and (F17) integrity
Contact Hours
96
SCH Hours
3
Revised
Fall 2024