Active Outline
General Information
- Course ID (CB01A and CB01B)
- CISD046.
- Course Title (CB02)
- Fundamentals of Digital Security
- Course Credit Status
- Credit - Degree Applicable
- Effective Term
- Fall 2023
- Course Description
- This course provides broad-based knowledge and hands-on experience with many facets of network security. It includes website and database attacks/defense, identified vulnerability exploits, layered security approaches, and Active Directory security policy settings. Includes cryptography, hashing, access controls, physical, application, data defenses, auditing, and security protocols. Also, the course can help prepare students to pass the CompTIA Security+ Certification exam.
- Faculty Requirements
- Course Family
- Not Applicable
Course Justification
This course belongs on the Enterprise Security Professional Certificates and A.A. degree. This course provides students with the foundation skills for computer security and supports professional employment in the Silicon Valley. This course is CSU transferable.
Foothill Equivalency
- Does the course have a Foothill equivalent?
- No
- Foothill Course ID
Formerly Statement
Course Development Options
- Basic Skill Status (CB08)
- Course is not a basic skills course.
- Grade Options
- Letter Grade
- Pass/No Pass
- Repeat Limit
- 0
Transferability & Gen. Ed. Options
- Transferability
- Transferable to both UC and CSU
Units and Hours
Summary
- Minimum Credit Units
- 4.5
- Maximum Credit Units
- 4.5
Weekly Student Hours
Type | In Class | Out of Class |
---|---|---|
Lecture Hours | 4.0 | 8.0 |
Laboratory Hours | 1.5 | 0.0 |
Course Student Hours
- Course Duration (Weeks)
- 12.0
- Hours per unit divisor
- 36.0
Course In-Class (Contact) Hours
- Lecture
- 48.0
- Laboratory
- 18.0
- Total
- 66.0
Course Out-of-Class Hours
- Lecture
- 96.0
- Laboratory
- 0.0
- NA
- 0.0
- Total
- 96.0
Prerequisite(s)
Corequisite(s)
Advisory(ies)
ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.
CIS D108.
Limitation(s) on Enrollment
Entrance Skill(s)
General Course Statement(s)
Methods of Instruction
Lecture and visual aids
Discussion of assigned reading
Discussion and problem solving performed in class
Quiz and examination review performed in class
Homework and extended projects
Laboratory discussion sessions and quizzes that evaluate the proceedings weekly laboratory exercises
Assignments
- Reading assignments
- Complete assigned homework review questions
- View assigned security videos
Methods of Evaluation
- Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated based on correctness.
- Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.
Essential Student Materials/Essential College Facilities
Essential Student Materials:Â
- None.
- None.
Examples of Primary Texts and References
Author | Title | Publisher | Date/Edition | ISBN |
---|---|---|---|---|
Darril Gibson. "CompTIA Security+: Get Certified Get Ahead." SY0-501 Edition. YCDA LLC, 2017. |
Examples of Supporting Texts and References
Author | Title | Publisher |
---|---|---|
Kim, David. "Fundamentals of Information Security." Third Edition. Jones and Bartlett Learning LLC, an Ascent Learning Company, 2018 |
Learning Outcomes and Objectives
Course Objectives
- Explore network security issues
- Investigate access control and identity management
- Implement cryptography
- Investigate policies, procedures, and awareness
- Identify physical security
- Utilize perimeter defenses
- Implement network defenses
- Design host defenses
- Identify application defenses
- Formulate data defenses
- Perform security assessments and audits
CSLOs
- Determine methods to protect network against security vulnerabilities.
Outline
- Explore network security issues
- Security challenges
- Security roles and concepts
- Threat agent types
- Security introduction
- General attack strategy
- General defense strategy
- Attack and defense strategy overview
- Investigate access control and identity management
- Access control models
- Authentication
- Authorization
- Access control best practices
- Windows domain users and groups
- Linux users and groups
- Linux user security
- Group policy overview
- Hardening authentication
- Remote access
- Network authentication
- Identity management
- Implement cryptography
- Cryptography concepts
- Hashing
- Symmetric encryption
- Asymmetric encryption
- Public Key Infrastructure (PKI)
- Cryptography implementations
- Investigate policies, procedures, and awareness
- Security policies
- Business continuity
- Risk management
- Incident response
- Social engineering
- Certification and accreditation
- Development
- Employee management
- Business impact analysis
- Disaster recovery plan
- Identify physical security
- Physical security definitions
- Hardware security
- Environmental controls
- Mobile devices
- Telephony
- The Internet of Things
- Utilize perimeter defenses
- Networking review
- Perimeter attacks
- Security appliances
- Packet Captures
- Firewalls
- Network Address Translation (NAT)
- Virtual Private Networks (VPN)
- Web threat protection
- Network Access Control (NAC)
- Wireless attacks
- Wireless defenses
- Implement network defenses
- Network devices
- Network device vulnerabilities
- Switch attacks
- Router and switch security
- Intrusion detection and prevention
- Design host defenses
- Malware
- Password attacks
- Windows system hardening
- Hardening enforcement
- File server security
- Linux host security
- Identify application defenses
- Web application attacks
- Internet browsers
- Network applications
- Virtualization
- Application development
- System life Cycle
- Application software testing
- Formulate data defenses
- Redundancy
- Backup and restore
- File encryption
- Secure protocols
- Cloud computing
- Perform security assessments and audits
- Vulnerability assessment
- Penetration testing
- Protocol analyzers
- Logs and audits
- System testing and monitoring
Lab Topics
- Use Active Directory to view, create, manage user accounts and groups
- Eliminate threats with a layered security approach
- Use asymmetric encryption to encrypt and decrypt files
- Perform reconnaissance and probing using common tools
- Perform a vulnerability assessments
- Enable Windows Active Directory and user access controls
- Use Group Policy Objects and Microsoft Baseline Security Analyzer for change control
- Perform packet capture and traffic analysis
- Implement a business continuity plan
- Perform a web site and database attack by exploiting identified vulnerabilities