Active Outline

General Information


Course ID (CB01A and CB01B)
CISD308.
Course Title (CB02)
Personal Computer Security Basics
Course Credit Status
Non-Credit
Effective Term
Fall 2023
Course Description
This is a beginner's computer security course for small office or home users. Students will learn to stop hackers, worms, viruses, spyware, web bugs, identity theft, and other cyber threats. Vulnerabilities found in web browsers, e-mail, and operating systems will also be learned, along with how to protect against online purchase dangers, install firewalls, manage cookies, restrict ports, evaluate wireless networks, and examine encryption. The course includes numerous hands-on exercises to demonstrate security concepts. This noncredit, tuition-free course will be completed in the same class as CIS D108. students covering the same course content.
Faculty Requirements
Course Family
Not Applicable

Course Justification


This is a noncredit enhanced, CTE course that is part of the Business Software Applications Certificate of Completion. It was developed based on state and national trends needing computer security professionals. This course addresses the need for all students and security professionals to protect their personal and business data from hackers and other cyber threats.

Foothill Equivalency


Does the course have a Foothill equivalent?
No
Foothill Course ID

Course Philosophy


Formerly Statement


Course Development Options


Basic Skill Status (CB08)
Course is not a basic skills course.
Grade Options
  • Letter Grade
  • Pass/No Pass
Repeat Limit
99

Transferability & Gen. Ed. Options


Transferability
Not transferable

Units and Hours


Summary

Minimum Credit Units
0.0
Maximum Credit Units
0.0

Weekly Student Hours

TypeIn ClassOut of Class
Lecture Hours4.08.0
Laboratory Hours1.50.0

Course Student Hours

Course Duration (Weeks)
12.0
Hours per unit divisor
36.0
Course In-Class (Contact) Hours
Lecture
48.0
Laboratory
18.0
Total
66.0
Course Out-of-Class Hours
Lecture
96.0
Laboratory
0.0
NA
0.0
Total
96.0

Prerequisite(s)


Corequisite(s)


Advisory(ies)


ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.

CIS D004.

Limitation(s) on Enrollment


Entrance Skill(s)


General Course Statement(s)


NONCREDIT: (This is a noncredit enhanced, CTE course.)

Methods of Instruction


Lecture and visual aids

Discussion of assigned reading

Discussion and problem solving performed in class

Quiz and examination review performed in class

Homework and extended projects

Assignments


  1. Reading from assigned security articles
  2. Summarize web articles
  3. Complete assigned homework questions

Methods of Evaluation


  1. Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated on correctness.
  2. Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.

Essential Student Materials/Essential College Facilities


Essential Student Materials: 
  • None.
Essential College Facilities:
  • None.

Examples of Primary Texts and References


AuthorTitlePublisherDate/EditionISBN
Ciampa, Mark. "Security Awareness: Applying Practical Security in Your World." Fifth Edition. Boston, MA: Cengage Learning, 2017.

Examples of Supporting Texts and References


AuthorTitlePublisher
None.

Learning Outcomes and Objectives


Course Objectives

  • Recognize computer security fundamentals
  • Explore hacker terminology and attack methods
  • Detect and protect against virus, worms and Trojan horse attacks
  • Implement password security
  • Evaluate online shopping safety
  • Evaluate internet browser security
  • Evaluate email security
  • Implement firewall security
  • Back up data files
  • Evaluate Windows, Macintosh and Unix operating system security vulnerabilities
  • Recognize physical access security vulnerabilities
  • Explore cloud computing security vulnerabilities
  • Identify wireless network vulnerabilities
  • Explore identity theft

CSLOs

  • Determine the best plan of action to stop malware based on security breach scenarios.

Outline


  1. Recognize computer security fundamentals
    1. Explore computer port purpose and types
    2. Explore hacker port attack methodology
    3. Configure port protection methods
  2. Explore hacker terminology and attack methods
    1. Investigate practical hacker definitions and types
    2. Investigate legal definition of computer hackers
    3. Define computer breach types
    4. Define computer breach techniques
    5. Investigate computer protection methods
    6. Investigate DOS attacks
    7. Investigate social engineering attack methods
  3. Detect and protect against virus, worms and Trojan horse attacks
    1. Define terminology
    2. Determine operating methods
    3. Identify malware examples
    4. Determine protection methods
  4. Implement password security
    1. Identify safe and unsafe password practices
    2. Identify password theft techniques
    3. Identify insecure Internet utilities
  5. Evaluate online shopping safety
    1. Discuss past and present online shopping scams
    2. Explore online banking vulnerabilities
    3. Identify safe Internet shopping practices
  6. Evaluate internet browser security
    1. Identify and protect against web bugs
    2. Identify and protect against Java, javascript, activeX vulnerabilities
    3. Set Internet zones to protect against fraud and hackers
    4. Utilize secure sockets layer to protect Internet transactions
    5. Manage cookies
    6. Evaluate browser add-ons
    7. Evaluate private browsing methods
    8. Evaluate browser security setting levels
    9. Explore system restore points
  7. Evaluate email security
    1. Discuss past and present email scams
    2. Identify vulnerabilities in email programs
    3. Identify safe email usage practices
      1. URL cloaking
      2. Email phishing
      3. Spam filters
      4. Web bugs
    4. Identify spoofing techniques
    5. Investigate email privacy issues
    6. Investigate email social engineering techniques
    7. Identify cloud-based email security issues
  8. Implement firewall security
    1. Evaluate and implement software firewalls
    2. Evaluate hardware firewall security
  9. Back up data files
    1. Determine the importance of backing up data files
    2. Explore methods of backing up data files
    3. Explore cloud backup methods and security implications
  10. Evaluate Windows, Macintosh and Unix operating system security vulnerabilities
    1. Contrast FAT and NTFS security
    2. Explore NTFS permissions
    3. Implement NTFS Encryption
    4. Explore Macintosh file system features and vulnerabilities
    5. Explore Unix system features and vulnerabilities
    6. Explore Microsoft Windows security operating system vulnerabilities
  11. Recognize physical access security vulnerabilities
    1. Investigate laptop security issues
    2. Investigate Security Accounts Manager database file vulnerabilities
    3. Recognize hardware encryption benefits
    4. Explore OS physical access vulnerabilities
    5. Explore shadow files contained on hard drives
  12. Explore cloud computing security vulnerabilities
    1. Identify cross-site scripting flaws
    2. Identify injection security flaws
    3. Identify Web 2.0 flaws
    4. Identify HTML 5 flaws
    5. Identify social media dangers
  13. Identify wireless network vulnerabilities
    1. Determine methods to compromise wireless networks
      1. Wifi 802.11X
      2. Security Set Identifier (SSID)
      3. WEP, WPA1 and WPA2
      4. Man in the middle attacks
      5. Cell phones
      6. Virtual Private Networks
    2. Determine methods to protect wireless networks
      1. Encryption
      2. MAC address
      3. Router configuration
      4. Ports
      5. Password strategy
  14. Explore identity theft
    1. Investigate the methods used to steal identities
    2. Identify social security number vulnerabilities
    3. Evaluate identity theft prevention techniques

Lab Topics


  1. Explore and provide written report on findings to share with class regarding safe web sites that contain hacker discussions, articles and site exploits.
  2. Explore and provide written report on findings to share with class regarding new viruses that have been released to the public and describe in terms of key concepts including replication, trigger and payload.
  3. Download, install and configure software firewall.
  4. Access web site to scan ports to determine port vulnerabilities.
  5. Send email using private remailer service and use email software to view the hidden email header contents.
  6. Download and install passwords software programs to securely record web sites links, usernames and passwords.
  7. Use Msconfig program to optimize Windows system performance and secure applications by viewing the automatic applications that are running on a computer.
  8. Research famous hackers and determine ethics of the hacker exploits by investigating their actions.
Back to Top