ITN 170 Information Security

This course provides a basic foundation in information security, including terminology, technologies, planning, and implementation. Students explore risk and legal issues related to information security.

Credits

3

Prerequisite

Prerequisite: ITN 120

See Course Syllabus

Course Number and Title:

ITN 170 Information Security

Campus Location

  • Dover
  • Georgetown
  • Wilmington

Prerequisites

Prerequisite: ITN 120

Course Credits and Hours

3 credit(s)

2 lecture hours/week

2 lab hours/week

Course Description

This course provides a basic foundation in information security, including terminology, technologies, planning, and implementation. Students explore risk and legal issues related to information security.

Additional Materials

Access to high-speed Internet

Required Text(s)

Obtain current textbook information by viewing the campus bookstore - https://www.dtcc.edu/bookstores online or visit a campus bookstore. Check your course schedule for the course number and section.

Core Course Performance Objectives (CCPOs)

  1. Describe the purpose of components used to secure information technology assets. (CCC 1; PGC 4)
  2. Explain the various methods of attack and how to mitigate the risk. (CCC 1, 2; PGC 1, 3, 4)
  3. Analyze the asset to determine the appropriate security controls given specific scenarios. (CCC 1, 2; PGC 1, 2, 3, 4)
  4. Explain the basic concepts of forensics and incident response. (CCC 1, 2; PGC 1, 3)
  5. Explain the purpose and function of cryptography. (CCC 1, 2; PGC 1, 3, 4)
  6. Develop a disaster recovery and business continuity plan (DR/BC). (CCC 1, 2, 3, 5; PGC 1, 2, 3, 4)
  7. Examine information security policies to protect information technology assets. (CCC 1, 2, 3, 5; PGC 1, 2, 3, 4)

See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.

Measurable Performance Objectives (MPOs)

Upon completion of this course, the student will:

  1. Describe the purpose of components used to secure information technology assets.
    1. Define computer security terminology.
    2. Explain the purpose and function of key components in information security architecture.
  2. Explain the various methods of attack and how to mitigate the risk.
    1. Explain the various types of attacks.
    2. Identify the indicators of compromise given a scenario.
    3. Identify the type of attack given a scenario.
    4. Explain penetration testing concepts.
  3. Analyze the asset to determine the appropriate security controls given specific scenarios.
    1. Explain the types and purposes of security controls.
    2. Select appropriate mitigation controls given a scenario.
    3. Compare and contrast the function and purpose of authentication services.
    4. Select appropriate authentication authorization or access control given a scenario.
  4. Explain the basic concepts of forensics and incident response.
    1. Describe basic concepts of forensics.
    2. Follow incident response procedures.
  5. Explain the purpose and function of cryptography.
    1. Describe the application and use of symmetric, asymmetric, and public key infrastructure (PKI).
    2. Explain generalized cryptographic concepts.
    3. Use appropriate cryptographic methods given a specific scenario.
  6. Develop a disaster recovery and business continuity plan (DR/BC).
    1. Describe types of disasters that compromise availability to information.
    2. Differentiate among the types of DR/BC implementations.
    3. Draft a DR/BC plan to meet an organization's needs.
  7. Examine information security policies to protect information technology assets.
    1. Analyze security policies in accordance with an organization's requirements for accuracy and relevancy.
    2. Draft components of an information security policy to meet an organization's needs.
    3. Select appropriate data security and privacy practices to meet an organization's needs.

Evaluation Criteria/Policies

The grade will be determined using the Delaware Tech grading system:

90-100 = A
80-89 = B
70-79 = C
0-69 = F
Students should refer to the Catalog/Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.

Program Graduate Competencies (PGCs are the competencies every graduate will develop specific to his or her major)

  1. Solve technology-related problems using critical thinking and troubleshooting skills.
  2. Articulate the role of the technology professional in organizations to support the ethical use of information technology.
  3. Apply fundamental security concepts and strategies for maintaining and securing information technology.
  4. Read and interpret technical information and effectively communicate to a wide range of audiences using oral, print, and multimedia strategies.
  5. Demonstrate the importance of lifelong learning that empowers personal and professional growth.

Core Curriculum Competencies (CCCs are the competencies every graduate will develop)

  1. Apply clear and effective communication skills.
  2. Use critical thinking to solve problems.
  3. Collaborate to achieve a common goal.
  4. Demonstrate professional and ethical conduct.
  5. Use information literacy for effective vocational and/or academic research.
  6. Apply quantitative reasoning and/or scientific inquiry to solve practical problems.

Students in Need of Accommodations Due to a Disability

We value all individuals and provide an inclusive environment that fosters equity and student success. The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. The College's policy on accommodations for persons with disabilities can be found in the College's Guide to Requesting Academic Accommodations and/or Auxiliary Aids Students may also access the Guide and contact information for Disabilities Support Counselors through the Student Resources web page under Disabilities Support Services, or visit the campus Advising Center.

Minimum Technology Requirements

Minimum technology requirements for online, hybrid, video conferencing and web conferencing courses.