Course Number and Title:
ITN 271 Advanced Security Operations
Campus Location
- Dover
- Georgetown
- Wilmington
Prerequisites
Prerequisite: ITN 150 and ITN 170
Course Credits and Hours
3 credit(s)
2 lecture hours/week
2 lab hours/week
Course Description
This course prepares students to maintain and analyze system and network security of on-premise and cloud-based systems. Topics include identity and access management, automation tools for provisioning, deployment and management of resources, and challenges in securing networked architectures.
Additional Materials
Access to high-speed Internet.
Core Course Performance Objectives (CCPOs)
- Design a Security Operations Center (SOC). (CCC 1, 2, 3, 4; PGC 1, 2, 3, 4)
- Evaluate and implement technologies that enable fault tolerant architectures. (CCC 1, 2, 3; PGC 1, 3)
- Analyze and respond appropriately to security incidents. (CCC 1, 2, 4; PGC 1, 3)
- Implement threat hunting procedures to detect malicious activity. (CCC 1, 2, 4; PGC 1, 3)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Measurable Performance Objectives (MPOs)
Upon completion of this course, the student will:
- Design a Security Operations Center (SOC).
- Explain SOC fundamentals.
- Select the appropriate metrics that can be used for a basis of action.
- Develop response capability plans aligned with business requirements.
- Select Security Incident and Event Management (SIEM) to meet business requirements.
- Configure SIEM to collect appropriate metrics.
- Develop a report to communicate meaningful metrics to a business.
- Use industry standard procedures for privileged access to networked resources.
- Evaluate and implement technologies that enable fault tolerant architectures.
- Use and manage container resources.
- Automate provisioning of container resources to support business operations.
- Implement and monitor resources for availability and responsiveness.
- Design architectures to support system resilience and availability.
- Analyze and respond appropriately to security incidents.
- Define industry standard incident handling procedures.
- Compare and contrast incidents versus events.
- Discuss tools used to estimate and track costs associated with incidents.
- Determine appropriate communication and actions given a scenario.
- Analyze output from Intrusion Detection System/Intrusion Prevention System (IDS/IPS) to recognize an incident.
- Describe the purpose of wireless IDS/IPS.
- Describe the steps of a kill chain.
- Implement threat hunting procedures to detect malicious activity.
- Explain the concept of passive intrusion monitoring.
- Explain the concept of active intrusion deterrents.
- Explain the purpose and function of threat hunting.
- Configure passive intrusion monitoring tools to detect malicious activity.
- Configure active intrusion deterrents to thwart malicious activity.
Evaluation Criteria/Policies
The grade will be determined using the Delaware Tech grading system:
90-100 |
= |
A |
80-89 |
= |
B |
70-79 |
= |
C |
0-69 |
= |
F |
Students should refer to the
Catalog/Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
Final Course Grade
Calculated using the following weighted average
Evaluation Measure | Percentage of final grade |
Summative: Quizzes (equally weighted) | 40% |
Summative: Final Project | 20% |
Formative: Labs (equally weighted) | 30% |
Formative: The course will contain an equal number of formative assessments including but not limited to: assignments discussion boards quizzes | 10% |
TOTAL | 100% |
Program Graduate Competencies (PGCs are the competencies every graduate will develop specific to his or her major)
- Solve technology-related problems using critical thinking and troubleshooting skills.
- Articulate the role of the technology professional in organizations to support the ethical use of information technology.
- Apply fundamental security concepts and strategies for maintaining and securing information technology.
- Read and interpret technical information and effectively communicate to a wide range of audiences using oral, print, and multimedia strategies.
- Demonstrate the importance of lifelong learning that empowers personal and professional growth.
Core Curriculum Competencies (CCCs are the competencies every graduate will develop)
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
Students in Need of Accommodations Due to a Disability
We value all individuals and provide an inclusive environment that fosters equity and student success. The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. The College's policy on accommodations for persons with disabilities can be found in the College's Guide to Requesting Academic Accommodations and/or Auxiliary Aids Students may also access the Guide and contact information for Disabilities Support Counselors through the Student Resources web page under Disabilities Support Services, or visit the campus Advising Center.