CSE 5472
Transcript Abbreviation:
Info Sec Projects
Course Description:
Team-based projects: solve information security problems (mobile/static host/network hardening, intrusion detection and vulnerability scanning, forensics); results communicated through report writing and presentation.
Course Levels:
Undergraduate (1000-5000 level)
Graduate
Designation:
Elective
General Education Course:
(N/A)
Cross-Listings:
(N/A)
Credit Hours (Minimum if “Range”selected):
3.00
Max Credit Hours:
(N/A)
Select if Repeatable:
Off
Maximum Repeatable Credits:
(N/A)
Total Completions Allowed:
(N/A)
Allow Multiple Enrollments in Term:
No
Course Length:
14 weeks (autumn or spring)
12 weeks (summer only)
Off Campus:
Never
Campus Location:
Columbus
Instruction Modes:
In Person (75-100% campus; 0-24% online)
Prerequisites and Co-requisites:
Prereq: 3901, 3902, or 3903, and 3461, 5461, or 4471; or Grad standing.
Electronically Enforced:
No
Exclusions:
(N/A)
Course Goals / Objectives:
Be competent with the use of VMWare to create flexible, complex virtual computer networks
Be competent with techniques for hardening various operating systems (Linux and Windows) and services running on these systems (web, database, others)
Be familiar with issues involved in the configuration and use of firewalls, intrusion detection/prevention, and vulnerability scanning/exploit tools
Be familiar with common software vulnerabilities and techniques for finding and fixing them
Be familiar with host security standards and laws such as HIPAA, PCI, Ohio House Bill 104, OWASP, NSA, CSI and so on
Be familiar with general goals of and issues pertaining to computer forensic analysis and incident response
Be exposed to a wide variety of computer security tools, especially forensics and investigation tools and scanning tools
Check if concurrence sought:
No
Contact Hours:
Topic | LEC | REC | LAB | LAB Inst |
---|---|---|---|---|
Host hardening: configuration, patching, logging & monitoring, host-based intrusion detection, etc. | 4.0 | 0.0 | 2.0 | 0 |
Network Security: vulnerability scanning and enumeration, web application scanning, VPN, sniffing, network-based intrusion detection, etc. | 4.0 | 0.0 | 2.0 | 0 |
Computer Investigations: incident response, forensics, malware analysis, etc. | 4.0 | 0.0 | 2.0 | 0 |
Miscellaneous topics relating to information security | 2.0 | 0.0 | 1.0 | 0 |
VMware, project objectives | 10.0 | 0.0 | 5.0 | 0 |
Total | 24 | 0 | 12 | 0 |
Grading Plan:
Letter Grade
Course Components:
Lecture
Lab
Grade Roster Component:
Lecture
Credit by Exam (EM):
No
Grades Breakdown:
Aspect | Percent |
---|---|
Host Hardening Project - paper, presentation, lab notebook | 30% |
Network Security Project - paper, presentation, lab notebook | 30% |
Computer Investigation Project - paper, presentation, lab notebook | 30% |
Participation, attendance, peer evaluations | 10% |
Representative Textbooks and Other Course Materials:
Title | Author | Year |
---|---|---|
Various, from the Internet |
ABET-CAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Significant contribution (7+ hours) | Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. |
2 | Substantial contribution (3-6 hours) | Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. |
3 | Substantial contribution (3-6 hours) | Communicate effectively in a variety of professional contexts. |
4 | Significant contribution (7+ hours) | Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles |
5 | Substantial contribution (3-6 hours) | Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline |
6 | Substantial contribution (3-6 hours) | Apply computer science theory and software development fundamentals to produce computing-based solutions. |
ABET-ETAC Criterion 3 Outcomes:
(N/A)
ABET-EAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Significant contribution (7+ hours) | an ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics |
2 | Substantial contribution (3-6 hours) | an ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors |
3 | Substantial contribution (3-6 hours) | an ability to communicate effectively with a range of audiences - pre-2019 EAC SLO (g) |
4 | Significant contribution (7+ hours) | an ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts |
5 | Substantial contribution (3-6 hours) | an ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives |
6 | Significant contribution (7+ hours) | an ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions |
7 | Substantial contribution (3-6 hours) | an ability to acquire and apply new knowledge as needed, using appropriate learning strategies |
Embedded Literacies Info:
Attachments:
(N/A)
Additional Notes or Comments:
(N/A)
Basic Course Overview:
CSE_5472_basic.pdf
(10.45 KB)