Emerging Technologies

Similar documents
Cisco 1: Networking Fundamentals

Certified Cyber Security Analyst VS-1160

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Course Outline (version 2)

Cisco 2: Routing Technologies

Cisco 4: Enterprise Networking

Fundamentals of Graphic Design

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Advanced Microsoft Word & Desktop Publishing

Security Awareness. Chapter 2 Personal Security

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

716 West Ave Austin, TX USA

Introduction to Information Security Dr. Rick Jerz

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

SYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CRN150 Fundamentals of Network Security

Free antivirus software download

Destiny is the internet provider of all Br(ik buildings and student residences.

Web Development with ASP.Net

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA Security+ Study Guide (SY0-501)

Security Awareness. Presented by OSU Institute of Technology

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Web Foundations Series Internet Business Associate

Course Outline. CISSP - Certified Information Systems Security Professional

CHAPTER 8 SECURING INFORMATION SYSTEMS

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Introduction to PLC Systems

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

General Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec

Java 2. Course Outcome Summary. Western Technical College. Course Information. Course History. Course Competencies

Introduction to Computer World Fall 2016

ISDP 2018 Industry Skill Development Program In association with

Security+ SY0-501 Study Guide Table of Contents

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Unit 2 Assignment 2. Software Utilities?

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Pathway Assessment Blueprint

Unit 2 Essentials of cyber security

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

MODULE NO.28: Password Cracking

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

ITIS 104: INFORMATION TECHNOLOGY

ITSY Information Technology Security Course Syllabus Spring 2018

Virginia Western Community College ITN 110 Client Operating System (Windows 10)

Cybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

ECDL / ICDL IT Security. Syllabus Version 2.0

Standards and Competencies ITS 1.0 Perform maintenance on systems and components

ITE 119 Information Literacy

CEH: CERTIFIED ETHICAL HACKER v9

Vocabulary Bank organized by module

Cisco 3: Advanced Routing & Switching

Chapter 16: Advanced Security

Program SLOs Computer Information Science

CompTIA A+ Accelerated course for & exams

Changing face of endpoint security

Endpoint Security - what-if analysis 1

IT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006

Cybersecurity The Evolving Landscape

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Bachelor of Information Technology

Systems and Principles Unit Syllabus

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

CompTIA Cybersecurity Analyst+

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva

Chapter 4 Network and Internet Security

Frequently Asked Questions (FAQ)

COWLEY COLLEGE & Area Vocational Technical School

INTERNET SAFETY IS IMPORTANT

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Introduction. Assessment Test. Part I

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Chapter 6 Network and Internet Security and Privacy

Chapter 12. Information Security Management

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Information Technology, the Internet, and You The McGraw-Hill Companies, Inc. All rights reserved.

Information Technology Standards

Online Security and Safety Protect Your Computer - and Yourself!

Security Issues When Preparing for Disasters

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

How To Remove Personal Antivirus Security Pro Virus

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

SECURE USE OF IT Syllabus Version 2.0

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

PRACTICING SAFE COMPUTING AT HOME

Citrix Access Firefox Browser

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

Transcription:

Western Technical College 10154123 Emerging Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 The learner will explore new technologies requiring information technology support and troubleshooting including but not limited to handheld devices, phones, tablets, storage devices, and cloud computing. This course provides a non-technical approach to practical computer security for all users, including different types of attacks, social engineering, malware, and spyware. The student will install, configure and update a variety of security software. In addition to basic security concepts, students will gain practical skills on how to protect their computers and networks from increasingly sophisticated attacks. Information Technology Associate Degree Courses Types of Instruction Instruction Type Lecture Lab Credits/Hours 2 CR / 36 HR 1 CR / 36 HR Course History Last Approval Date 5/9/2016 Textbooks No textbook required. Program Outcomes 1. Manage Information Technology Hardware Summative 1.1. 10-154-3 TSA Rubric Course Outcome Summary - Page 1 of 6

1.1. learner selects appropriate hardware 1.2. learner demonstrates proper safety techniques 1.3. learner installs hardware (according to established specifications) 1.4. learner configures hardware (according to established specifications) 1.5. learner tests hardware 2. Manage Software Summative 2.1. 10-154-3 TSA Rubric 2.1. learner selects appropriate software 2.2. learner installs software 2.3. learner configures software 2.4. learner maintains software 2.5. learner manages data 3. Provide End User Support Summative 3.1. 10-154-3 TSA Rubric 3.1. learner performs common Help Desk functions 3.2. learner researches technology solutions 3.3. learner recommends technology solutions 3.4. learner educates end users 3.5. learner creates effective documentation 3.6. learner follows industry practices (ITIL, HDI for example) 4. Solve Information Technology Problems Summative 4.1. 10-154-3 TSA Rubric 4.1. learner follows a troubleshooting model to solve a problem 4.2. learner monitors incident management handling Course Competencies 1. Explore computer security, terminology, and several different categories of computer attackers 1.1. Written Product Performance will be satisfactory when: 1.1. you describe why it is difficult to achieve computer security 1.2. you define information security 1.3. you can identify the three layers of protection 1.4. you can define computer security terminology 1.5. you can identify the types of attackers that are common today 1.6. you can describe how to build a security strategy Course Outcome Summary - Page 2 of 6

1.7. you can identify federal and state laws enacted to protect the privacy of electronic data 1.a. Describe the challenges of securing information 1.b. Define information security and explain why it is important 1.c. Identify the types of attackers that are common today 1.d. Describe how to build a security strategy 2. Explain personal security and how to reduce the risks 2.1. Written Product 2.1. you define what qualifies as a weak versus strong password 2.2. you describe the different types of password attacks; brute force, dictionary 2.3. you can identify the different types of social engineering attacks including but not limited to, psychological approaches, impersonation, phishing and their varieties, hoaxes, shoulder surfing 2.4. you have a clear understanding of what identify theft is and the techniques for stealing personal information 2.5. you can recommend defenses to increase personal security 2.a. Define what makes a weak password 2.b. Describe the attacks against passwords 2.c. Identify the different types of social engineering attacks 2.d. Describe identity theft and the risks of using social networking 2.e. Describe personal security defenses 3. Explain different types of computer attacks and how to install and use antivirus software 3.1. Written Product 3.1. you can list and describe the different types of attacks on computers 3.2. you can explain how to manage patches 3.3. you can install antivirus software 3.4. you can use antivirus software 3.5. you explain User Account Control 3.6. you describe how to recover from an attack on a computer using a rescue disk 3.a. List and describe the different types of attacks on computers 3.b. Explain how to manage patches 3.c. Describe how to install and use antivirus software 3.d. Explain User Account Control 3.e. Describe how to recover from an attack 4. Explain the risks associated with Internet Security and possible defenses Domain Cognitive Level Evaluating Status Active 4.1. Written Product 4.1. you explain how the Internet works: HTML, TCP/IP, basic port numbers 4.2. you explain the basic e-mail systems: SMTP, POP3, and IMAP4 4.3. you describe how attackers use mobile code, cookies, and fraudulent digital certificates 4.4. you can list the security risks with using e-mail: spam, malicious attachments, embedded hyperlinks 4.5. you describe how to use Web browser settings to create stronger security Course Outcome Summary - Page 3 of 6

4.6. you can list several different e-mail defenses 4.a. Explain how the Internet and e-mail work 4.b. Describe how attackers can use mobile code, cookies, and fraudulent digital certificates 4.c. List the security risks with using e-mail 4.d. Describe how to use Web browser settings to create stronger security 4.e. List several different e-mail defenses 5. Explain mobile security and the attacks that may be encountered 5.1. Written Product 5.1. you define wi-fi and bluetooth 5.2. you explain how wi-fi and bluetooth work 5.3. you describe the various attacks that can be launched against a wireless network 5.4. you list the defenses for a home wi-fi network 5.5. you describe how to securely use a public wireless network 5.6. you list the types of mobile device security for laptops, tablets, and smartphones 5.a. Define Wi-Fi and Bluetooth and explain how they work 5.b. Describe the various attacks that can be launched against a wireless network 5.c. List the defenses for a home Wi-Fi network 5.d. Describe how to use a public wireless network securely 5.e. List the types of mobile device security for laptops, tablets, and smartphones 6. Identify what workplace security may be required 6.1. Written Product 6.1. you define physical access 6.2. you can list tools to restrict physcial access to facilities with sensitive equipment or resources 6.3. you describe how tokens and cards can be used for security 6.4. you explain what a security policy is and list several different types of subpolicies 6.5. you define technology and procedural access control 6.6. you list the steps that should be taken to prepare for a crisis 6.a. Define physical access and list the tools used to restrict it 6.b. Describe how tokens and cards can be used for security 6.c. Explain what a security policy is and list several different subpolicies 6.d. Define technology and procedural access control 6.e. List the steps to be taken to prepare for a crisis 7. Compare different tablets and evaluate their hardware for business use 7.1. Written Product 7.2. Oral Presentation 7.1. you identify several different tablet computers available in the current market 7.2. you evaluate the tablet computers specifications 7.3. you compare and contrast the tablet computers specifications with their competitors 7.4. you document the use of a tablet for a new user Course Outcome Summary - Page 4 of 6

7.5. you can troubleshoot basic problems with a tablet device 7.a. Identify several tablets available today 7.b. Evaluate the tablets specifications 7.c. Compare and contrast the specifications to their competition 7.d. Document the use of a tablet for a new user 7.e. Troubleshoot basic problems with a tablet device 8. Evaluate a variety of different tablet software applications for business use Domain Cognitive Level Evaluating Status Active 8.1. Skill Demonstration 8.1. you identify several business applications for use on a tablet computer 8.2. you research and evaluate several similar business applications for a tablet device 8.3. you explain the use of several business applications for a tablet device 8.4. you can troubleshoot basic problems with tablet software applications 8.5. you recommend a business application for a specific user 8.a. Identify several business applications for use on tablets 8.b. Evaluate similar business applications 8.c. Explain the use of several business applications for tablets 8.d. Troubleshoot basic problems with tablet software applications 9. Investigate current cell phones and evaluate the options for a business 9.1. Written Product 9.2. Oral Presentation 9.1. you identify several mobile phone models available today 9.2. you compare and contrast the specifications of selected mobile phones 9.3. you explain the use of new and advanced features of mobile phones 9.4. you can troubleshoot minor problems or direct the user to the appropriate location for assistance with their mobile phone 9.a. Identify several mobile phone models available today 9.b. Compare and contrast the specifications of selected mobile phones 9.c. Explain the use of new and advanced features of mobile phones 9.d. Troubleshoot basic problems with mobile phones 10. Explain cloud computing and demonstrate its use Domain Cognitive Level Evaluating Status Active 10.1. Written Product 10.1. you describe the concept of cloud computing 10.2. you use cloud computing with application software on a mobile device 10.3. you can demonstrate the use of cloud computing to a user 10.a. Describe cloud computing 10.b. Demonstrate the use of cloud computing 11. Explore new technologies that may require Information Technology support and Course Outcome Summary - Page 5 of 6

troubleshooting Domain Cognitive Level Applying Status Active 11.1. Written Product 11.2. Reflection 11.1. you identify new technologies in Information Technology 11.2. you explain the use of new technologies 11.3. you determine the significance of the new technologies in business 11.a. Identify new technologies in Information Technology 11.b. Explain the use of new technologies 11.c. Determine the significance of the new technology in business Course Outcome Summary - Page 6 of 6