Cis 108 syllabus

Solo disponible en BuenasTareas
  • Páginas : 13 (3006 palabras )
  • Descarga(s) : 9
  • Publicado : 29 de julio de 2010
Leer documento completo
Vista previa del texto
CAOS & CIS 108
CAOS-108-61Z Call # 0181
Instructor: Mark Sherby Summer ‘09 4.0 Units
De Anza College Distance Learning Center • LCW-107 • Phone: 408-864-8969 • FAX: 408-864-8245 • • M–Th, 9:00 a.m.–7 p.m.; Fri, CLOSED

This course uses pre-recorded lectures that will introduce you tocomputer security issues that affect small office or home users (end-users). We will learn how to stop hackers, worms, viruses, spyware, web bugs and identity theft. We will explore vulnerabilities found in web browsers, email and operating systems. Furthermore, you will be able to protect against online purchase dangers, install firewalls, manage cookies, restrict ports, evaluate wirelessnetworks and examine encryption.

Advisory: CAOS 102L (Windows XP Professional) or hands-on experience with Microsoft Windows.

Office Hours Held: By appointment only in summer quarter
Phone/Voicemail: (408) 864-5471
Office Location: F-51D or AT-203b
E-mail address: or

REQUIREMENTSCOMPLETE THE ONLINE ORIENTATION and submit the Student Information Form by 12 noon on Friday, July 3. There is NO on-campus orientation. The online orientation may be found at the following WEB address:
2. Create and login with into your Catalyst account
a. View assigned video lectures
b. Download PowerPoint slides. View speaker notes.
c. Readposted web articles.
d. Complete lab/homework assignments.
e. Upload lab assignments into Catalyst for grading.
f. Pass online midterm.
g. Pass the online final exam.

course Objectives 
After completing the course readings, viewing video lectures and completing homework/lab assignments, you should be able to:
1. Recognize computer security fundamentals.
2. Definehacker terminology and attack methods.
3. Detect and protect against virus, worms and Trojan horse attacks.
4. Implement password security.
5. Evaluate online shopping safety.
6. Evaluate and implement Internet browser security.
7. Evaluate and implement Email security.
8. Implement firewall security.
9. Explore data backup strategies.
10. Evaluate securityvulnerabilities found in the Windows operating system.
11. Recognize physical access security vulnerabilities.
12. Explore and protect data with Windows encryption.
13. Explore and prevent identity theft.
14. Explore Windows Vista Security features.

This is a GREEN course!
No textbook is required for this class!
It is recommended for those new in thesecurity field (but not required) to print PowerPoint slides and speaker notes (instructions provided in course orientation video).

Catalyst Instructions
You will be using the Catalyst web site to turn in your homework, complete the online exams, view PowerPoint slides, read online articles and view video streaming lectures. Please note that you will not be able to log into your course until thefirst day of instruction. Although Internet Explorer can be used to log into Catalyst, it is highly recommended to use Mozilla Firefox instead, especially when you are accessing the course exams.

To log on to Catalyst for De Anza students registered in Catalyst classes:
Go to and then follow the instructions provided.

After you have logged intoCatalyst, be sure to click on the “Show all topics” button to expand and view all the available topics on this page.

All of the course’s lectures are available for viewing using either Media Player or Real Player. It is highly recommended to view the video lectures multiple times (or rewind) if you are unclear about the material presented. A high speed...
tracking img