ISSC452 - Cybersecurity
Course Code: ISSC452 Course ID: 4410 Credit Hours: 3 Level: Undergraduate
This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics.
|Registration Dates||Course Dates||Session||Weeks|
|05/21/21 - 10/29/21||11/01/21 - 12/26/21||Fall 2021 Session I||8 Week session|
|06/28/21 - 12/03/21||12/06/21 - 01/30/22||Fall 2021 Session D||8 Week session|
|07/27/21 - 12/31/21||01/03/22 - 02/27/22||Winter 2022 Session B||8 Week session|
|08/31/21 - 02/04/22||02/07/22 - 04/03/22||Winter 2022 Session I||8 Week session|
|09/28/21 - 03/04/22||03/07/22 - 05/01/22||Winter 2022 Session D||8 Week session|
|10/26/21 - 04/01/22||04/04/22 - 05/29/22||Spring 2022 Session B||8 Week session|
The successful student will fulfill the following learning objectives:
- Identify network and security concepts as they relate to cyber security
- Recognize the CERT requirements based upon the Department of Homeland Security (DHC)
- Categorize hacker techniques and motivations
- Analyze defense and analysis techniques, malicious code and iDefense
- Discuss data security, digital forensics, and enterprise continuity as it relates to cyber security
- Examine the importance of IT training and awareness
- Outline personnel, physical and environmental security as they relate to cyber security
- Assess the regulatory standards and compliances of cyber security
This course has a strong writing component. The goal is to organize, synthesize, and demonstrate your comprehension of core concepts investigated during this course by applying a combination of the terms, concepts, and details you have learned in a systematic way. As important as "the details" that you analyze and arrange in your writing, however, are the conclusions you draw from those details, and your predictions, responses to, and ultimate interpretation of those details.
- Download the asnWeekxx.doc, where xx is the week number, from the Resources section of the e-classroom. For example, asnWeek01.doc is the filename for week one assignments.
- After downloading the document, open it and enter your answers directly in the document.
- After answering the questions, save and upload the document in the Assignments section of the e-classroom.
- You may work ahead on assignments if you wish.
Assignments are due by Sunday 11:59 p.m. ET of the week in which they are assigned. If you need an extension, please contact me via email to discuss your circumstances.
Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals I understand you must manage competing demands on your time. Should you need additional time to complete an assignment please contact me before the due date so we can discuss the situation and determine an acceptable resolution. Routine submission of late assignments is unacceptable and may result in points deducted from your final course grade. Assignments submitted late without prearranged extension will be subject to a 10% per day late penalty. No late assignments will be accepted after the last day of the course.
During the 8 weeks of this course, you will participate in a Forum activity. Each Forum activity will consist of one or more threads/topics. The assignments may involve discussion or debate. The questions are designed to allow you to apply what you have learned in the chapter to real-world scenarios or hypothetical, but realistic, situations. Post your answers to the questions in each thread prior to 11:55 p.m. ET on Wednesday. Please do not be late with this post because your classmates will be relying on you to post on time. A discussion period will then ensue from Thursday through Sunday. Read your classmates' posts and post at least two follow-up messages to your classmates’ posts in each thread prior to 11:59 p.m. ET on Sunday. Some threads may require you to post more than two replies, so make sure you read the directions carefully. Of course, you may always post more than the required number of replies and you are encouraged to continue participating in the discussion even after you have met the minimum number of posts required. Your Forum participation will be considered at the end of the semester if your grade is on the borderline. Borderline grades will only be rounded up if you have exceeded the minimum requirements on the Forum and shown insight and critical thinking in all of your posts and replies. Your follow-up posts must contain substance and should add additional insight to your classmates’ opinions or challenge their opinions. It is never sufficient to simply say, “I agree with what you wrote” or “I really liked your post.” You must use your follow-up posts as a way to continue the discussion at a high level of discourse. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification, including questions posted by your professor. You will be expected to log into the classroom several times each week to participate in the class discussion. Forum postings are a large part of your grade and I will be looking for quality and depth in your postings. I will also expect you to list your references at the end of each post. References should be in APA citation format.
You will be required to write one term paper this semester. The specifications are as follows:
- You must write a 4-6 page term paper on a topic of your choice related to cyber security. Some examples would include, the importance of encryption, malicious code physical security, regulatory compliance, or a topic of your choice. (All topics must be approved).
- Your term paper outline is due at the end of Week 2.
- Your term paper is due at the end of Week 8.
- In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
- Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
- Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font. You must have a minimum of 5-6 outside sources.
- Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
- Papers must be submitted to www.turnitin.com for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A SIGNIFICANT POINT REDUCTION.
- PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.
|Weekly Assignments||32.00 %|
|Assignment #1||4.00 %|
|Assignment #2||4.00 %|
|Assignment #3||4.00 %|
|Assignment #4||4.00 %|
|Assignment #5||4.00 %|
|Assignment #6||4.00 %|
|Assignment #7||4.00 %|
|Assignment #8||4.00 %|
|Forum Week 1||5.00 %|
|Forum Week 2||5.00 %|
|Forum Week 3||5.00 %|
|Forum Week 4||5.00 %|
|Forum Week 5||5.00 %|
|Forum Week 6||5.00 %|
|Forum Week 7||5.00 %|
|Forum Week 8||5.00 %|
|Term Paper Outline||3.00 %|
|Term Paper Outline||3.00 %|
|Term Paper||25.00 %|
|Term Paper||25.00 %|
|Book Title:||To find the library e-book(s) req'd for your course, please visit http://apus.libguides.com/er.php to locate the eReserve by course #.|
|Author:||No Author Specified|
|Book Title:||Cyber Security Essentials-E-book available in the APUS Online Library|
|Publication Info:||Taylor & Francis Group Lib|
|Author:||Graham, Olson, Howard|
Not current for future courses.