The information listed below is subject to change. Please review the course syllabus within your online course at the start of class.
The competencies you will demonstrate in this course are as follows:
Outcomes | Competencies | |
---|---|---|
1 | Identify basic principles of IT security, such as CIA and AAA, basic threats, and ways to mitigate those threats. | A |
2 | Describe the various hats worn in the hacker society. | A |
3 | Describe the other types of attackers. | A |
4 | Identify computer security threats. | A |
5 | Describe how malware finds its way to computer systems. | A |
6 | Identify how to defend against malware threats in a proactive way. | A, D |
7 | Identify, install, and configure security applications such as personal firewalls, antivirus programs, and host-based intrusion detection systems. | A, D |
8 | Describe how to protect a computer’s hardware, UEFI/BIOS, wireless devices, and peripherals such as USB devices. | A, D, H |
9 | Describe how to protect mobile devices and the data they contain by using screen locks, encryption, remote wipe utilities, and good BYOD policies. | A, D, H |
10 | Identify and install patches and hotfixes. | A, D |
11 | Identify the various virtualization technologies. | A, D |
12 | Identify how to secure the web browser. | A, D, H |
13 | Identify how to secure common applications such as Microsoft Office and demonstrate how to make those applications safe. | A, D, H |
14 | Identify the basic concepts of programming security including system testing, secure code review, and fuzzing. | A, D, H |
Outcomes | Competencies | |
---|---|---|
1 | Describe network design elements. | B |
2 | Describe how the security administrator must strike a balance of security and data availability. | H |
3 | Identify and secure ports and their associated protocols. | B |
4 | Describe network attacks and explain how to defend against them. | B |
5 | Identify network security concepts. | B |
6 | Identify the characteristics, advantages, disadvantages, and differences of network intrusion detection systems and network intrusion prevention systems. | H |
7 | Identify how to reduce the risk of attack to wired networks and the central connecting devices that control access to those networks. | H |
8 | Secure wireless networks, including wireless access points and wireless network adapters. | D |
Outcomes | Competencies | |
---|---|---|
1 | Identify methods to ensure proper authentication when a person enters a building. | D |
2 | Identify local authentication technologies. | E |
3 | Identify and implement access control models. | D, E |
4 | Identify and implement users, groups, permissions, rights, and policies that can be created on a computer network. | D |
5 | Describe qualitative and quantitative risk and describe the methodologies of an important part of risk management. | D |
6 | Apply common network security tools to measure the vulnerability of computer systems and network devices. | D |
Outcomes | Competencies | |
---|---|---|
1 | Identify and implement monitoring of the network. | D, F |
2 | Implement performance analysis tools. | D, F, G |
3 | Describe how to execute an audit and how to use some of the tools in a Windows server to perform audits and log them properly. | F, G, H |
4 | Identify understand the basic terminology of cryptography. | H, I |
5 | Identify the various symmetric algorithms. | H, D |
6 | Describe the most common way to verify the integrity of files: hashing. | D |
7 | Identify PKI and its components. | D |
8 | Describe security protocols. | D |
Outcomes | Competencies | |
---|---|---|
1 | Identify how to ensure that the network and servers are fault tolerant. Topics covered include redundant power, data, servers, and ISPs. | J |
2 | Describe how to back up data and develop a proper disaster recovery plan. | H, J |
3 | Describe the methods and techniques that social engineers can employ to gain access to buildings and systems. | F |
4 | Describe how to train users on the basics of security. | G, F |
5 | Describe fire suppression methods as well as HVAC, shielding, and the Faraday cage concept. | J, K |
6 | Identify ways to classify data, laws that protect individual privacy, personnel security policies and how to implement them, service-level agreements, and the safe disposal of computers. | K |
7 | Describe the processes and procedures involved in computer security incident management. Proper planning for incident response is key, as is the ability to document the lessons learned. | G, K |
8 | Describe the basics of security frameworks and how they can help to organize IT processes and procedures. | G, K |
The semester schedule for this course may be 15 weeks or 10 weeks in duration. Based on the course format, this table shows the approximate amount of time you should plan to spend per week on this course. This includes time to read/listen to the online content, participate in discussion forums, complete all assignments, and study the course material.
For accelerated courses, the amount of time required per week is greater. Note that regardless of course format, the course material is the same and all course competencies, module outcomes, and assignments will be covered.
Course Credit Hours | Course Format (Duration) | Pace Relative to a 15 Week Course | Course Activity Hours | Student Learning Hours Per Week |
---|---|---|---|---|
4 | 15 Weeks | - | 180 | 11.5 to 12.5 |
4 | 10 Weeks | 1.5x faster | 180 | 17 to 19 |
Aside from typical reading assignments, this course has the following (Please Note: This list is subject to change based on the discretion of the instructor facilitating this course.):
Assignment | Points | % |
---|---|---|
Discussions (10 @ 10 points each) | 100 | 10% |
Quizzes (18 @ 20 points each) | 360 | 36% |
Performance Labs (15 @ 30 points each) | 450 | 45% |
Practice Certification | 90 | 9% |
TOTAL | 1000 | 100% |
CCCOnline goes to great lengths to assure the quality of your online learning experience. You can expect the following from our courses: