Course Code: ISSC660 Course ID: 3873 Credit Hours: 3 Level: Graduate
The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.
|Registration Dates||Course Dates||Session||Weeks|
|01/25/21 - 07/02/21||07/05/21 - 08/29/21||Summer 2021 Session B||8 Week session|
|02/22/21 - 07/30/21||08/02/21 - 09/26/21||Summer 2021 Session I||8 Week session|
|03/29/21 - 09/03/21||09/06/21 - 10/31/21||Summer 2021 Session D||8 Week session|
|04/26/21 - 10/01/21||10/04/21 - 11/28/21||Fall 2021 Session B||8 Week session|
|05/21/21 - 10/29/21||11/01/21 - 12/26/21||Fall 2021 Session I||8 Week session|
A successful student will fulfill the following learning objectives:
- Examine the scope, domain, and components of organizational security policy and planning.
- Define and profile IA infrastructure.
- Investigate asset management and develop a plan for business continuity.
- Assess legal and regulatory compliance requirements within an information assurance security policy.
- Appraise access controls, operations security, and network security within the operational and technical domain of information assurance.
- Analyze IA principles and practices for application security and system software security.
- Appraise and conduct operational risk assessment and audit.
- Evaluate the ethical issues related to Information assurance.
The grading will be based on eight graded homework assignments, eight weekly Forum postings, an individual project paper and its prep work, and an open book final examination.
- There will be eight homework assignments (5% each) counting a total of 40% of the final grade. The homework assignments will follow each of the major portions of the course. These assignments will be problems or questions from the text. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word or an equivalent word processor program and uploaded into the student folder by the due date. Visio diagrams should be incorporated within the Word document as part of the document.
- There will be eight weekly Forum postings you will need to respond to. Answers should be a paragraph with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 100 words (about 6 or 7 sentences). You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your position using the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. The Forum postings will count as 24% (3% for each week’s discussion postings) of the final grade.
- There will be one project paper (15%) and three project prep mini-assignments each worth 21 %. Total paper with prep weight is 36%
|Assignments||Week 1 Assignment|
|Week 2 Assignment||Week 3 Assignment|
|Week 4 Assignment||Week 5 Assignment|
|Week 6 Assignment||Week 7 Assignment|
|Week 8 Assignment||Forums|
|Week 1 Forum||Week 2 Forum|
|Week 3 Forum||Week 4 Forum|
|Week 5 Forum||Week 6 Forum|
|Week 7 Forum||Week 8 Forum|
|Project||Week 2 Proposal to the Week 8 Project Paper|
|Week 4 Project Outline for the Week 8 Project Paper||Week 6 Annotated Bibliography for the Week 8 Project Paper|
|Week 8 Project Paper|
Reference: American Psychological Association. (2010). Publication manual of the American Psychological Association (6th edition). Washington, DC: Author. ISBN: 1-4338-0561-8
- Microsoft Office (MS Word, MS Excel, MS PowerPoint)
- Adobe Acrobat Reader (Click here for free download)
Web Resources for Telecommunications & Network Security:
1. Methodology of an Attack
2. OSI Reference Model
3. Internet Protocol
6. Centralized Remote User Authentication
7. Kerberos Authentication
8. Directory Services
9. Configuration Services
10. Storage Data Services
11. Printing Services
|Book Title:||Additional reading is found online. Links/URLs are provided inside the classroom.|
|Author:||No Author Specified|
|Book Title:||Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance, 2nd ed. - eBook available in the APUS Online Library|
|Book Title:||REFERENCE ONLY- Information Security Fundamentals, 2nd edition-This text will be REQUIRED in ISSC661 and ISSC680. This text will be used as a reference only for the other courses in the ISSC program. E-book available in the APUS Online Library|
|Publication Info:||Auerbach Publications|
|Author:||Thomas R. Peltier|
Not current for future courses.