Course Code: ISSC362 Course ID: 2635 Credit Hours: 3 Level: Undergraduate
This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.
|Registration Dates||Course Dates||Session||Weeks|
|11/30/20 - 04/30/21||05/03/21 - 06/27/21||Spring 2021 Session I||8 Week session|
|12/28/20 - 06/04/21||06/07/21 - 08/01/21||Spring 2021 Session D||8 Week session|
|01/25/21 - 07/02/21||07/05/21 - 08/29/21||Summer 2021 Session B||8 Week session|
|02/22/21 - 07/30/21||08/02/21 - 09/26/21||Summer 2021 Session I||8 Week session|
|03/29/21 - 09/03/21||09/06/21 - 10/31/21||Summer 2021 Session D||8 Week session|
After successfully completing this course, you will be able to:
- Show how attackers map organizations
- Describe common port scanning techniques
- Identify some of the tools used to perform enumeration
- Explain the significance of wireless security
- List the issues facing Web servers
- Describe the characteristics of malware
- List the ways of detecting Trojans
- Describe the process of DoS attacks
- Describe the benefits of automated assessment tools
- List the components of incident response
- List the detective methods of IDS
Grading will be based on weekly assignments: forums labs, quizzes, an individual project paper (topic selection, outline and paper) and a case study.
- There will be eight forums (3.13% each) counting a total of 25% of the final grade. Answers should restate the question with supporting sentences using the terms, concepts, and theories from the required readings. The key requirement is to express your idea and then support your position to demonstrate that you understand the material. Your answer should be a minimum of 250 words.
In addition, you are to respond to at least two of your classmates’ postings by critiquing, supporting or supplementing the other students’ answers. Your responses should be at least 100 words long. All responses should be courteous with sound supporting sentences. You may respond multiple times within a continuous discussion with points and counter points. Duplicate responses will not receive credit.
- There will be eight labs (2.5% for each) counting a total of 25% of the final grade. You can access labs by clicking on Online Labs. Step-by-Step instructions for each lab are available, and you can access these files within Lessons. Submit deliverables through the Assignments link within your course.
- There will be one final exam (25 questions worth 4 points per question) and one Midterm exam (25 questions worth 4 points per question) accounting for a total of 25% of the final grade. Each exam will consist of 25 multiple choice questions pulled from chapters covered from week 1 through 5 for the Midterm and Weeks 1 through 8 for the Final exam.
- There will be three exercises during this term counting a total of 25% of the final grade, completed as follows:
- Week 2 Topic Selection – selection of topic for the Week 7 Research Paper.
- Week 4 Outline – outline of topics and subtopics for the Week 7 Research Paper.
- Week 7 Research Paper – present research paper on your chosen topic.
Below is a list of pre-approved topics for the Week 7 Research Paper:
- Protecting IT: A Roadmap for Securing the Enterprise
- Best Practices for Network Security
- Firewalls: Great Network Security Devices, but Not a "Silver Bullet" Solution
- Modern Day Attacks Against Firewalls and VPNs
- VPN Security Vulnerabilities Exposed
The key to the research assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material.
The paper will follow a conventional report format (introduction, body, conclusion, references). The paper is to follow the APA style guide, Sixth Edition (available via bookstores). Also refer to APA’s online resources: http://apastyle.apa.org/learn/tutorials/basics-tutorial.aspx and the APUS web site: http://www.apus.edu/Online-Library/tutorials/apa.htm
Note: Review Announcements and Lessons for additional instructions and course materials.
- Each week you will also have chapter readings assigned, and PowerPoint presentations to review.
All assignments, labs, forum questions and quizzes are required by 11:55 PM Eastern Standard Time of the Sunday of the week assigned.
|Week 1 Forum||3.13 %|
|Week 2 Forum||3.13 %|
|Week 3 Forum||3.13 %|
|Week 4 Forum||3.13 %|
|Week 5 Forum||3.13 %|
|Week 6 Forum||3.13 %|
|Week 7 Forum||3.13 %|
|Week 8 Forum||3.13 %|
|Week 1 Lab||3.13 %|
|Week 2 Lab||3.13 %|
|Week 3 Lab||3.13 %|
|Week 4 Lab||3.13 %|
|Week 5 Lab||3.13 %|
|Week 6 Lab||3.13 %|
|Week 7 Lab||3.13 %|
|Week 8 Lab||3.13 %|
|ISSC362 Final Exam||12.50 %|
|ISSC362 MidTerm Exam||12.50 %|
|Week 2 Topic Selection||2.50 %|
|Week 4 Outline||7.50 %|
|Week 7 Research Paper||15.00 %|
Starting April 2016 this title & edition has moved to VitalSource. The VitalSource e-book is provided via the APUS Bookstore. Please visit http://apus.libguides.com/bookstore for more information.
- Microsoft Office (MS Word, MS Excel, MS PowerPoint)
- Mozilla Firefox (recommended browser)
|Book Title:||ISSC362 virtual lab manual provided inside the classroom|
|Publication Info:||CLASS-Jones & Bartlett|
|Electronic Unit Cost:||$55.00|
|Book Title:||Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility - instructions provided inside the classroom.|
|Author:||No Author Specified|
|Book Title:||Hacker Techniques, Tools, And Incident Handling, 2nd ed - e-book available in the APUS Online Library|
|Publication Info:||Jones & Bartlett - Lib|
Not current for future courses.