Active Outline
General Information
- Course ID (CB01A and CB01B)
- CISD108.
- Course Title (CB02)
- Personal Computer Security Basics
- Course Credit Status
- Credit - Degree Applicable
- Effective Term
- Fall 2023
- Course Description
- A beginner's computer security course for small office or home users. Learn to stop hackers, worms, viruses, spyware, web bugs, identity theft, and other cyber threats. Learn vulnerabilities found in web browsers, e-mail, and operating systems. Protect against online purchase dangers, install firewalls, manage cookies, restrict ports, evaluate wireless networks and examine encryption. The course includes numerous hands-on exercises to demonstrate security concepts.
- Faculty Requirements
- Course Family
- Not Applicable
Course Justification
This CTE course was developed based on state and national trends needing computer security professionals. This course belongs in a number of certificates and degrees such as the Network Administration (Certificate of Achievement). This course addresses the need for all students and security professionals to protect their personal and business data from hackers and other cyber threats.
Foothill Equivalency
- Does the course have a Foothill equivalent?
- No
- Foothill Course ID
Formerly Statement
Course Development Options
- Basic Skill Status (CB08)
- Course is not a basic skills course.
- Grade Options
- Letter Grade
- Pass/No Pass
- Repeat Limit
- 0
Transferability & Gen. Ed. Options
- Transferability
- Not transferable
Units and Hours
Summary
- Minimum Credit Units
- 4.5
- Maximum Credit Units
- 4.5
Weekly Student Hours
Type | In Class | Out of Class |
---|---|---|
Lecture Hours | 4.0 | 8.0 |
Laboratory Hours | 1.5 | 0.0 |
Course Student Hours
- Course Duration (Weeks)
- 12.0
- Hours per unit divisor
- 36.0
Course In-Class (Contact) Hours
- Lecture
- 48.0
- Laboratory
- 18.0
- Total
- 66.0
Course Out-of-Class Hours
- Lecture
- 96.0
- Laboratory
- 0.0
- NA
- 0.0
- Total
- 96.0
Prerequisite(s)
Corequisite(s)
Advisory(ies)
ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.
CIS D004.
Limitation(s) on Enrollment
Entrance Skill(s)
General Course Statement(s)
Methods of Instruction
Lecture and visual aids
Discussion of assigned reading
Discussion and problem solving performed in class
Quiz and examination review performed in class
Homework and extended projects
Assignments
- Reading from assigned security articles
- Summarize web articles
- Complete assigned homework questions
Methods of Evaluation
- Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated on correctness.
- Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.
Essential Student Materials/Essential College Facilities
Essential Student Materials:Â
- None.
- None.
Examples of Primary Texts and References
Author | Title | Publisher | Date/Edition | ISBN |
---|---|---|---|---|
Ciampa, Mark. "Security Awareness: Applying Practical Security in Your World." Fifth Edition. Boston, MA: Cengage Learning, 2017. |
Examples of Supporting Texts and References
Author | Title | Publisher |
---|---|---|
None. |
Learning Outcomes and Objectives
Course Objectives
- Recognize computer security fundamentals
- Explore hacker terminology and attack methods
- Detect and protect against virus, worms and Trojan horse attacks
- Implement password security
- Evaluate online shopping safety
- Evaluate internet browser security
- Evaluate email security
- Implement firewall security
- Back up data files
- Evaluate Windows, Macintosh and Unix operating system security vulnerabilities
- Recognize physical access security vulnerabilities
- Explore cloud computing security vulnerabilities
- Identify wireless network vulnerabilities
- Explore identity theft
CSLOs
- Determine the best plan of action to stop malware based on security breach scenarios.
Outline
- Recognize computer security fundamentals
- Explore computer port purpose and types
- Explore hacker port attack methodology
- Configure port protection methods
- Explore hacker terminology and attack methods
- Investigate practical hacker definitions and types
- Investigate legal definition of computer hackers
- Define computer breach types
- Define computer breach techniques
- Investigate computer protection methods
- Investigate DOS attacks
- Investigate social engineering attack methods
- Detect and protect against virus, worms and Trojan horse attacks
- Define terminology
- Determine operating methods
- Identify malware examples
- Determine protection methods
- Implement password security
- Identify safe and unsafe password practices
- Identify password theft techniques
- Identify insecure Internet utilities
- Evaluate online shopping safety
- Discuss past and present online shopping scams
- Explore online banking vulnerabilities
- Identify safe Internet shopping practices
- Evaluate internet browser security
- Identify and protect against web bugs
- Identify and protect against Java, javascript, activeX vulnerabilities
- Set Internet zones to protect against fraud and hackers
- Utilize secure sockets layer to protect Internet transactions
- Manage cookies
- Evaluate browser add-ons
- Evaluate private browsing methods
- Evaluate browser security setting levels
- Explore system restore points
- Evaluate email security
- Discuss past and present email scams
- Identify vulnerabilities in email programs
- Identify safe email usage practices
- URL cloaking
- Email phishing
- Spam filters
- Web bugs
- Identify spoofing techniques
- Investigate email privacy issues
- Investigate email social engineering techniques
- Identify cloud-based email security issues
- Implement firewall security
- Evaluate and implement software firewalls
- Evaluate hardware firewall security
- Back up data files
- Determine importance of backing up data files
- Explore methods of backing up data files
- Explore cloud backup methods and security implications
- Evaluate Windows, Macintosh and Unix operating system security vulnerabilities
- Contrast FAT and NTFS security
- Explore NTFS permissions
- Implement NTFS Encryption
- Explore Macintosh file system features and vulnerabilities
- Explore Unix system features and vulnerabilities
- Explore Microsoft Windows security operating system vulnerabilities
- Recognize physical access security vulnerabilities
- Investigate laptop security issues
- Investigate Security Accounts Manager database file vulnerabilities
- Recognize hardware encryption benefits
- Explore OS physical access vulnerabilities
- Explore shadow files contained on hard drives
- Explore cloud computing security vulnerabilities
- Identify cross site scripting flaws
- Identify injection security flaws
- Identify Web 2.0 flaws
- Identify HTML 5 flaws
- Identify social media dangers
- Identify wireless network vulnerabilities
- Determine methods to compromise wireless networks
- Wifi 802.11X
- Security Set Identifier (SSID)
- WEP, WPA1 and WPA2
- Man in the middle attacks
- Cell phones
- Virtual Private Networks
- Determine methods to protect wireless networks
- Encryption
- MAC address
- Router configuration
- Ports
- Password strategy
- Determine methods to compromise wireless networks
- Explore identity theft
- Investigate the methods used to steal identities
- Identify social security number vulnerabilities
- Evaluate identity theft prevention techniques
Lab Topics
- Explore and provide written report on findings to share with class regarding safe web sites that contain hacker discussions, articles and site exploits.
- Explore and provide written report on findings to share with class regarding new viruses that have been released to the public and describe in terms of key concepts including replication, trigger and payload.
- Download, install and configure software firewall.
- Access web site to scan ports to determine port vulnerabilities.
- Send email using private remailer service and use email software to view the hidden email header contents.
- Download and install passwords software programs to securely record web sites links, usernames and passwords.
- Use Msconfig program to optimize Windows system performance and secure applications by viewing the automatic applications that are running on a computer.
- Research famous hackers and determine ethics of the hacker exploits by investigating their actions.