Active Outline

General Information


Course ID (CB01A and CB01B)
CISD046.
Course Title (CB02)
Fundamentals of Digital Security
Course Credit Status
Credit - Degree Applicable
Effective Term
Fall 2023
Course Description
This course provides broad-based knowledge and hands-on experience with many facets of network security. It includes website and database attacks/defense, identified vulnerability exploits, layered security approaches, and Active Directory security policy settings. Includes cryptography, hashing, access controls, physical, application, data defenses, auditing, and security protocols. Also, the course can help prepare students to pass the CompTIA Security+ Certification exam.
Faculty Requirements
Course Family
Not Applicable

Course Justification


This course belongs on the Enterprise Security Professional Certificates and A.A. degree. This course provides students with the foundation skills for computer security and supports professional employment in the Silicon Valley. This course is CSU transferable.

Foothill Equivalency


Does the course have a Foothill equivalent?
No
Foothill Course ID

Course Philosophy


Formerly Statement


Formerly Statement

Course Development Options


Basic Skill Status (CB08)
Course is not a basic skills course.
Grade Options
  • Letter Grade
  • Pass/No Pass
Repeat Limit
0

Transferability & Gen. Ed. Options


Transferability
Transferable to both UC and CSU

Units and Hours


Summary

Minimum Credit Units
4.5
Maximum Credit Units
4.5

Weekly Student Hours

TypeIn ClassOut of Class
Lecture Hours4.08.0
Laboratory Hours1.50.0

Course Student Hours

Course Duration (Weeks)
12.0
Hours per unit divisor
36.0
Course In-Class (Contact) Hours
Lecture
48.0
Laboratory
18.0
Total
66.0
Course Out-of-Class Hours
Lecture
96.0
Laboratory
0.0
NA
0.0
Total
96.0

Prerequisite(s)


Corequisite(s)


Advisory(ies)


ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.

CIS D108.

Limitation(s) on Enrollment


Entrance Skill(s)


General Course Statement(s)


Methods of Instruction


Lecture and visual aids

Discussion of assigned reading

Discussion and problem solving performed in class

Quiz and examination review performed in class

Homework and extended projects

Laboratory discussion sessions and quizzes that evaluate the proceedings weekly laboratory exercises

Assignments


  1. Reading assignments
  2. Complete assigned homework review questions
  3. View assigned security videos

Methods of Evaluation


  1. Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated based on correctness.
  2. Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.

Essential Student Materials/Essential College Facilities


Essential Student Materials: 
  • None.
Essential College Facilities:
  • None.

Examples of Primary Texts and References


AuthorTitlePublisherDate/EditionISBN
Darril Gibson. "CompTIA Security+: Get Certified Get Ahead." SY0-501 Edition. YCDA LLC, 2017.

Examples of Supporting Texts and References


AuthorTitlePublisher
Kim, David. "Fundamentals of Information Security." Third Edition. Jones and Bartlett Learning LLC, an Ascent Learning Company, 2018

Learning Outcomes and Objectives


Course Objectives

  • Explore network security issues
  • Investigate access control and identity management
  • Implement cryptography
  • Investigate policies, procedures, and awareness
  • Identify physical security
  • Utilize perimeter defenses
  • Implement network defenses
  • Design host defenses
  • Identify application defenses
  • Formulate data defenses
  • Perform security assessments and audits

CSLOs

  • Determine methods to protect network against security vulnerabilities.

Outline


  1. Explore network security issues
    1. Security challenges
    2. Security roles and concepts
    3. Threat agent types
    4. Security introduction
    5. General attack strategy
    6. General defense strategy
    7. Attack and defense strategy overview
  2. Investigate access control and identity management
    1. Access control models
    2. Authentication
    3. Authorization
    4. Access control best practices
    5. Windows domain users and groups
    6. Linux users and groups
    7. Linux user security
    8. Group policy overview
    9. Hardening authentication
    10. Remote access
    11. Network authentication
    12. Identity management
  3. Implement cryptography
    1. Cryptography concepts
    2. Hashing
    3. Symmetric encryption
    4. Asymmetric encryption
    5. Public Key Infrastructure (PKI)
    6. Cryptography implementations
  4. Investigate policies, procedures, and awareness
    1. Security policies
    2. Business continuity
    3. Risk management
    4. Incident response
    5. Social engineering
    6. Certification and accreditation
    7. Development
    8. Employee management
    9. Business impact analysis
    10. Disaster recovery plan
  5. Identify physical security
    1. Physical security definitions
    2. Hardware security
    3. Environmental controls
    4. Mobile devices
    5. Telephony
    6. The Internet of Things
  6. Utilize perimeter defenses
    1. Networking review
    2. Perimeter attacks
    3. Security appliances
    4. Packet Captures
    5. Firewalls
    6. Network Address Translation (NAT)
    7. Virtual Private Networks (VPN)
    8. Web threat protection
    9. Network Access Control (NAC)
    10. Wireless attacks
    11. Wireless defenses
  7. Implement network defenses
    1. Network devices
    2. Network device vulnerabilities
    3. Switch attacks
    4. Router and switch security
    5. Intrusion detection and prevention
  8. Design host defenses
    1. Malware
    2. Password attacks
    3. Windows system hardening
    4. Hardening enforcement
    5. File server security
    6. Linux host security
  9. Identify application defenses
    1. Web application attacks
    2. Internet browsers
    3. E-mail
    4. Network applications
    5. Virtualization
    6. Application development
    7. System life Cycle
    8. Application software testing
  10. Formulate data defenses
    1. Redundancy
    2. Backup and restore
    3. File encryption
    4. Secure protocols
    5. Cloud computing
  11. Perform security assessments and audits
    1. Vulnerability assessment
    2. Penetration testing
    3. Protocol analyzers
    4. Logs and audits
    5. System testing and monitoring

Lab Topics


  1. Use Active Directory to view, create, manage user accounts and groups
  2. Eliminate threats with a layered security approach
  3. Use asymmetric encryption to encrypt and decrypt files
  4. Perform reconnaissance and probing using common tools
  5. Perform a vulnerability assessments
  6. Enable Windows Active Directory and user access controls
  7. Use Group Policy Objects and Microsoft Baseline Security Analyzer for change control
  8. Perform packet capture and traffic analysis
  9. Implement a business continuity plan
  10. Perform a web site and database attack by exploiting identified vulnerabilities
Back to Top