The information listed below is subject to change. Please review the course syllabus within your online course at the start of class.
The competencies you will demonstrate in this course are as follows:
Outcomes | Competencies | |
---|---|---|
1 | Define terms related to security and risk management. | A, I |
2 | Apply security governance principles to real-world situations. | A, B, C, I |
3 | Identify issues with ethical, legal and regulatory risk. | A, C, I |
4 | Identify security policies and procedures. | A, C, D, I |
5 | Discuss geographical threats. | A, D, F, I |
6 | Identify security risks in the supply chain. | A, B, F, I |
Outcomes | Competencies | |
---|---|---|
1 | Define terms related to asset security, architecture and engineering. | A |
2 | Identify vulnerabilities of architectures, designs, and solution elements of web-based, mobile, and embedded devices. | A, B, D, F, G, I, J |
3 | Identify cryptanalytic attacks. | A, B, F, H |
4 | Examine public key infrastructure. | A, B, E |
5 | Discuss site and facility design and security controls. | A, B, C, D, E, F, I, J, K |
Outcomes | Competencies | |
---|---|---|
1 | Define terms related to network security and access processes. | A |
2 | Examine prevention and mitigation of access control threats. | A, B, D, E, I |
3 | Describe security protocols and services. | A, B, D, E, I |
4 | Discuss Identity as a Service (IDaaS) implementation. | A, B, D, E |
5 | Describe access control threats and solutions. | A, B, D, E, I |
Outcomes | Competencies | |
---|---|---|
1 | Define terms related to security assessment, testing, and operations. | A |
2 | Apply logging and monitoring activities. | A, B, E, G, I, K |
3 | Examine the impact of assessment and testing on overall security of systems and servers. | A, B, C, F, I, J, K |
4 | Describe analysis and report test outputs. | A, B, G, I, K |
5 | Identify and assess security audits. | A, B, G |
6 | Discuss types of computer investigations and related software. (A, B, C) | A, B, C |
7 | Define processes and plans for change management, disaster recovery, business continuity and personnel. | A, B, C, D, F, J |
Outcomes | Competencies | |
---|---|---|
1 | Define terms related to software development and security. | A |
2 | Identify software development life cycles. | A, E, F |
3 | Assess software security effectiveness. | A, B, D, E, F |
4 | Discuss risk assessment practices in the workplace. | A, B, C, D, E, G |
The semester schedule for this course may be 15 weeks, 10 weeks, or 6 weeks in duration in duration. Based on the course format, this table shows the approximate amount of time you should plan to spend per week on this course. This includes time to read/listen to the online content, participate in discussion forums, complete all assignments, and study the course material.
For accelerated courses, the amount of time required per week is greater. Note that regardless of course format, the course material is the same and all course competencies, module outcomes, and assignments will be covered.
Course Credit Hours | Course Format (Duration) | Pace Relative to a 15 Week Course | Course Activity Hours | Student Learning Hours Per Week |
---|---|---|---|---|
3 | 15 Weeks | - | 135 | 8.5 to 9.5 |
3 | 10 Weeks | 1.5x faster | 135 | 12.5 to 14.5 |
3 | 6 Weeks | 2.5x faster | 135 | 21 to 24 |
Aside from typical reading assignments, this course has the following (Please Note: This list is subject to change based on the discretion of the instructor facilitating this course.):
Assignment | Points | % |
---|---|---|
Discussions (10 @ 20 points each) | 200 | 20% |
Labs (8 @ 25 points each) | 200 | 20% |
Flash Cards (8 @ 15 points each) | 120 | 12% |
Quizzes (8 @ 25 points each) | 200 | 20% |
Final Paper | 100 | 10% |
Capstone: uCertify Practice Certification Exam | 180 | 18% |
TOTAL | 1000 | 100% |
CCCOnline goes to great lengths to assure the quality of your online learning experience. You can expect the following from our courses: