Cis 108 syllabus

Páginas: 13 (3006 palabras) Publicado: 29 de julio de 2010
CAOS & CIS 108
PERSONAL COMPUTER SECURITY BASICS CIS -108-61Z Call #0296
CAOS-108-61Z Call # 0181
Instructor: Mark Sherby Summer ‘09 4.0 Units
De Anza College Distance Learning Center • LCW-107 • Phone: 408-864-8969 • FAX: 408-864-8245 • http://distance.deanza.edu • M–Th, 9:00 a.m.–7 p.m.; Fri, CLOSED

COURSE DESCRIPTION
This course uses pre-recorded lectures that will introduce you tocomputer security issues that affect small office or home users (end-users). We will learn how to stop hackers, worms, viruses, spyware, web bugs and identity theft. We will explore vulnerabilities found in web browsers, email and operating systems. Furthermore, you will be able to protect against online purchase dangers, install firewalls, manage cookies, restrict ports, evaluate wirelessnetworks and examine encryption.

Advisory: CAOS 102L (Windows XP Professional) or hands-on experience with Microsoft Windows.

INSTRUCTOR INFORMATION: Mark Sherby
Office Hours Held: By appointment only in summer quarter
Phone/Voicemail: (408) 864-5471
Office Location: F-51D or AT-203b
E-mail address: Sherbymark@deanza.edu or Msherby@pacbell.net
Website: Catalyst.deanza.edu

REQUIREMENTSCOMPLETE THE ONLINE ORIENTATION and submit the Student Information Form by 12 noon on Friday, July 3. There is NO on-campus orientation. The online orientation may be found at the following WEB address: http://distance.deanza.edu
2. Create and login with into your Catalyst account
a. View assigned video lectures
b. Download PowerPoint slides. View speaker notes.
c. Readposted web articles.
d. Complete lab/homework assignments.
e. Upload lab assignments into Catalyst for grading.
f. Pass online midterm.
g. Pass the online final exam.

course Objectives 
After completing the course readings, viewing video lectures and completing homework/lab assignments, you should be able to:
1. Recognize computer security fundamentals.
2. Definehacker terminology and attack methods.
3. Detect and protect against virus, worms and Trojan horse attacks.
4. Implement password security.
5. Evaluate online shopping safety.
6. Evaluate and implement Internet browser security.
7. Evaluate and implement Email security.
8. Implement firewall security.
9. Explore data backup strategies.
10. Evaluate securityvulnerabilities found in the Windows operating system.
11. Recognize physical access security vulnerabilities.
12. Explore and protect data with Windows encryption.
13. Explore and prevent identity theft.
14. Explore Windows Vista Security features.

COURSE MATERIALS
This is a GREEN course!
No textbook is required for this class!
It is recommended for those new in thesecurity field (but not required) to print PowerPoint slides and speaker notes (instructions provided in course orientation video).

Catalyst Instructions
You will be using the Catalyst web site to turn in your homework, complete the online exams, view PowerPoint slides, read online articles and view video streaming lectures. Please note that you will not be able to log into your course until thefirst day of instruction. Although Internet Explorer can be used to log into Catalyst, it is highly recommended to use Mozilla Firefox instead, especially when you are accessing the course exams.

To log on to Catalyst for De Anza students registered in Catalyst classes:
Go to https://catalyst.deanza.edu/ and then follow the instructions provided.

After you have logged intoCatalyst, be sure to click on the “Show all topics” button to expand and view all the available topics on this page.

VIDEOSTREAMING INSTRUCTIONS (COURSE LECTURES)
All of the course’s lectures are available for viewing using either Media Player or Real Player. It is highly recommended to view the video lectures multiple times (or rewind) if you are unclear about the material presented. A high speed...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • ciso
  • Ciso
  • CISO
  • ciso
  • CISO
  • Ciso
  • CISO
  • SYLLABUS

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS