Skip Navigation
 

ISSC362 - IT Security: Attack & Defense

Course Details

Course Code: ISSC362 Course ID: 2635 Credit Hours: 3 Level: Undergraduate

This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.





Course Schedule

Registration Dates Course Dates Session Weeks
04/29/19 - 10/04/19 10/07/19 - 12/01/19 Fall 2019 Session B 8 Week session
05/27/19 - 11/01/19 11/04/19 - 12/29/19 Fall 2019 Session I 8 Week session
06/24/19 - 11/29/19 12/02/19 - 01/26/20 Fall 2019 Session D 8 Week session
07/29/19 - 01/03/20 01/06/20 - 03/01/20 Winter 2020 Session B 8 Week session
08/26/19 - 01/31/20 02/03/20 - 03/29/20 Winter 2020 Session I 8 Week session
09/30/19 - 02/28/20 03/02/20 - 04/26/20 Winter 2020 Session D 8 Week session

Current Syllabi

After successfully completing this course, you will be able to:

  1. Show how attackers map organizations
  2. Describe common port scanning techniques
  3. Identify some of the tools used to perform enumeration
  4. Explain the significance of wireless security
  5. List the issues facing Web servers
  6. Describe the characteristics of malware
  7. List the ways of detecting Trojans
  8. Describe the process of DoS attacks
  9. Describe the benefits of automated assessment tools
  10. List the components of incident response
  11. List the detective methods of IDS

Grading will be based on weekly assignments: forums labs, quizzes, an individual project paper (topic selection, outline and paper) and a case study.

  • There will be eight forums (3.13% each) counting a total of 25% of the final grade. Answers should restate the question with supporting sentences using the terms, concepts, and theories from the required readings. The key requirement is to express your idea and then support your position to demonstrate that you understand the material. Your answer should be a minimum of 250 words.

In addition, you are to respond to at least two of your classmates’ postings by critiquing, supporting or supplementing the other students’ answers. Your responses should be at least 100 words long. All responses should be courteous with sound supporting sentences. You may respond multiple times within a continuous discussion with points and counter points. Duplicate responses will not receive credit.

  • There will be eight labs (2.5% for each) counting a total of 25% of the final grade. You can access labs by clicking on Online Labs. Step-by-Step instructions for each lab are available, and you can access these files within Lessons. Submit deliverables through the Assignments link within your course.

  • There will be one final exam (25 questions worth 4 points per question) and one Midterm exam (25 questions worth 4 points per question) accounting for a total of 25% of the final grade. Each exam will consist of 25 multiple choice questions pulled from chapters covered from week 1 through 5 for the Midterm and Weeks 1 through 8 for the Final exam.

  • There will be three exercises during this term counting a total of 25% of the final grade, completed as follows:

  1. Week 2 Topic Selection – selection of topic for the Week 7 Research Paper.
  2. Week 4 Outline – outline of topics and subtopics for the Week 7 Research Paper.
  3. Week 7 Research Paper – present research paper on your chosen topic.

Below is a list of pre-approved topics for the Week 7 Research Paper:

  • Protecting IT: A Roadmap for Securing the Enterprise
  • Best Practices for Network Security
  • Firewalls: Great Network Security Devices, but Not a "Silver Bullet" Solution
  • Modern Day Attacks Against Firewalls and VPNs
  • VPN Security Vulnerabilities Exposed

The key to the research assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material.

The paper will follow a conventional report format (introduction, body, conclusion, references). The paper is to follow the APA style guide, Sixth Edition (available via bookstores). Also refer to APA’s online resources: http://apastyle.apa.org/learn/tutorials/basics-tutorial.aspx and the APUS web site: http://www.apus.edu/Online-Library/tutorials/apa.htm

Note: Review Announcements and Lessons for additional instructions and course materials.

  • Each week you will also have chapter readings assigned, and PowerPoint presentations to review.

All assignments, labs, forum questions and quizzes are required by 11:55 PM Eastern Standard Time of the Sunday of the week assigned.

NameGrade %
Forums 25.00 %
Week 1 Forum 3.13 %
Week 2 Forum 3.13 %
Week 3 Forum 3.13 %
Week 4 Forum 3.13 %
Week 5 Forum 3.13 %
Week 6 Forum 3.13 %
Week 7 Forum 3.13 %
Week 8 Forum 3.13 %
Labs 25.00 %
Week 1 Lab 3.13 %
Week 2 Lab 3.13 %
Week 3 Lab 3.13 %
Week 4 Lab 3.13 %
Week 5 Lab 3.13 %
Week 6 Lab 3.13 %
Week 7 Lab 3.13 %
Week 8 Lab 3.13 %
Quizzes/Exams 25.00 %
ISSC362 MidTerm Exam 25.00 %
Exercises 25.00 %
Week 2 Topic Selection 2.50 %
Week 4 Outline 7.50 %
Week 7 Research Paper 15.00 %

Starting April 2016 this title & edition has moved to VitalSource. The VitalSource e-book is provided via the APUS Bookstore. Please visit http://apus.libguides.com/bookstore for more information.

Software Requirements

  1. Microsoft Office (MS Word, MS Excel, MS PowerPoint)
  2. Mozilla Firefox (recommended browser)
Book Title:Hacker Techniques, Tools, And Incident Handling, 2nd ed. - the VitalSource e-book is provided inside the classroom
ISBN:9781284031713
Publication Info:VS-Jones & Bartlett
Author:Oriyano
Unit Cost:$75.79
Electronic ISBN:9781284047455
Electronic Unit Cost:$35.00
Book Title:ISSC362 virtual lab manual provided inside the classroom
ISBN:9781284064100
Publication Info:CLASS-Jones & Bartlett
Electronic Unit Cost:$55.00
Book Title:Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility - instructions provided inside the classroom.
Author: No Author Specified

Previous Syllabi

Not current for future courses.