Course Code: ISSC641 Course ID: 3871 Credit Hours: 3 Level: Graduate
Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.
|Registration Dates||Course Dates||Session||Weeks|
|08/31/20 - 01/29/21||02/01/21 - 03/28/21||Winter 2021 Session I||8 Week session|
|09/28/20 - 02/26/21||03/01/21 - 04/25/21||Winter 2021 Session D||8 Week session|
|10/26/20 - 04/02/21||04/05/21 - 05/30/21||Spring 2021 Session B||8 Week session|
|11/30/20 - 04/30/21||05/03/21 - 06/27/21||Spring 2021 Session I||8 Week session|
|12/28/20 - 06/04/21||06/07/21 - 08/01/21||Spring 2021 Session D||8 Week session|
A successful student will fulfill the following learning objectives:
- Examine the principles of network security and cellular architecture.
- Evaluate emerging threats and system vulnerability.
- Assess vulnerabilities in telephony, short messaging service (SMS), cellular data networks, and in Voice over IP (VoIP).
- Appraise the open questions posited by network evolution and defense mechanisms.
- Evaluate the process for securing current and next generation telecommunications networks.
- Examine the challenges faced in securing networks and telecommunications.
- Examine the trends in Telecommunications and Network Systems security.
The grading will be based on eight graded homework assignments, eight weekly Forum postings, 3 project deliverables, and an individual project paper.
- There will be eight homework assignments (5% each) counting a total of 40% of the final grade. The homework assignments will follow each of the major portions of the course. These assignments will be problems or questions from the text. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word or an equivalent word processor program and uploaded into the student folder by the due date. Visio diagrams should be incorporated within the Word document as part of the document.
- There will be eight weekly Forum postings you will need to respond to. Answers should be a paragraph with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 100 words (about 6 or 7 sentences). You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your position using the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. The Forum postings will count as 19% of the final grade.
- There will be one project paper (15%) and three project prep mini-assignments worth 26%. Total paper with prep weight is 41%
Final Course Project
The deliverables for your Project Paper Assignment includes a Word document that answers the questions described below. Your final paper should be between 10 to 15 pages long. Be sure the report is in MS Word, Arial 12-pt font, with double spacing and 1 inch margins all-around, no additional spaces allowed. Cover page and references pages are also required.
Company Z provides telephony services to customers. These services include VoIP. You are hired to create a security assessment for company Z for an upcoming audit by the counties authoritative agents to certify company Z compliant to ISO 17799 Standard for The professional Practices for the Business Continuity Planner. In this security assessment you are asked to conduct a complete
- network security threat assessment (3%)
- network security vulnerability assessment (3%)
- risk assessment (3%)
- countermeasures and mitigation (3%)
- the last part of your work will include your personal experiences and what you have learned in this class reflected towards securing your system's network (3%)
You may use web resources as references, however make sure to include all your resources and cite from them with author, year of publication, and the corresponding page or paragraph numbers.
You must accompany the paper with an acceptable turnitin.com originality report. Here are the originality report requirements:
- The originality report must be less than 15% match excluding quoted and bibliography
- No single source shall be above 2%
- You must submit the originality report with your paper to your AMU classroom
If you don't follow these three requirements you will get a 0 for your project assignment. I will give you the chance to rework your papers until the acceptable level of match is achieved.
|Forum 1||2.50 %|
|Forum 2||2.50 %|
|Forum 3||2.50 %|
|Forum 4||2.50 %|
|Forum 5||2.50 %|
|Forum 6||2.50 %|
|Forum 7||2.50 %|
|Forum 8||2.50 %|
|Week 1 Assignment||5.00 %|
|Week 2 Assignment||5.00 %|
|Week 3 Assignment||5.00 %|
|Week 4 Assignment||5.00 %|
|Week 5 Assignment||5.00 %|
|Week 6 Assignment||5.00 %|
|Week 7 Assignment||5.00 %|
|Week 8 Assignment||5.00 %|
|Project Milestones||40.00 %|
|Week 2 Proposal for Week 7 Paper||5.00 %|
|Week 4 Paper Outline for Week 7 Paper||10.00 %|
|Week 6 Bibliography for Week 7 Paper||10.00 %|
|Week 7 Paper||15.00 %|
|Extra Credit||2.00 %|
|Extra credit||2.00 %|
- Microsoft Office (MS Word, MS Excel, MS PowerPoint)
- MS Office Visio – student or freely downloadable 60-day trial version from Microsoft.com (Visio will be used for diagramming UMLs)
- Adobe Acrobat Reader (Click here for free download)
|Book Title:||Security for Telecommunications Networks - eBook available in the APUS Online Library|
|Author:||Traynor, Patrick / McDaniel, Patrick / La Porta, Thomas|
|Book Title:||REFERENCE ONLY- Information Security Fundamentals, 2nd edition-This text will be REQUIRED in ISSC661 and ISSC680. This text will be used as a reference only for the other courses in the ISSC program. E-book available in the APUS Online Library|
|Publication Info:||Auerbach Publications|
|Author:||Thomas R. Peltier|
Not current for future courses.