CSE 4471
Transcript Abbreviation:
Info Security
Course Description:
Introduction to security of digital information; threats and attacks; regulations; risk management; attack detection and response; cryptography; forensics; technical training and certifications.
Course Levels:
Undergraduate (1000-5000 level)
Designation:
Elective
General Education Course:
(N/A)
Cross-Listings:
(N/A)
Credit Hours (Minimum if “Range”selected):
3.00
Max Credit Hours:
(N/A)
Select if Repeatable:
Off
Maximum Repeatable Credits:
(N/A)
Total Completions Allowed:
(N/A)
Allow Multiple Enrollments in Term:
No
Course Length:
14 weeks (autumn or spring)
12 weeks (summer only)
Off Campus:
Never
Campus Location:
Columbus
Instruction Modes:
In Person (75-100% campus; 0-24% online)
Prerequisites and Co-requisites:
2231 and 2321; and enrollment in CSE, CIS, ECE, or Data Analytics major, or Information Security or CS minor.
Electronically Enforced:
Yes
Exclusions:
(N/A)
Course Goals / Objectives:
Be competent with information security governance, and related legal and regulatory issues
Be competent with understanding external and internal information security threats to an organization
Be competent with information security awareness and a clear understanding of its importance
Be competent with how threats to an organization are discovered, analyzed, and dealt with
Be familiar with a high-level understanding of how information security functions in an organization
Be familiar with the structure of policies, standards and guidelines
Check if concurrence sought:
No
Contact Hours:
Topic | LEC | REC | LAB | LAB Inst |
---|---|---|---|---|
Information security, roles within an organization | 2 | 0.0 | 0.0 | 0 |
Legal, regulatory issues | 3.0 | 0.0 | 0.0 | 0 |
Threats, vulnerabilities, exploits | 8.0 | 0.0 | 0.0 | 0 |
Governance, policy, standards, guidelines | 3.0 | 0.0 | 0.0 | 0 |
Risk management | 3.0 | 0.0 | 0.0 | 0 |
Firewalls, Intrusion Detection, Incident Response, Forensics, Honeypots, VPN, Vulnerability Scanning | 6.0 | 0.0 | 0.0 | 0 |
Cryptography | 5.0 | 0.0 | 0.0 | 0 |
Access Control | 4.0 | 0.0 | 0.0 | 0 |
Physical Security, Personnel, Training, Education, Awareness, Certification | 3.0 | 0.0 | 0.0 | 0 |
Total | 37 | 0 | 0 | 0 |
Grading Plan:
Letter Grade
Course Components:
Lecture
Grade Roster Component:
Lecture
Credit by Exam (EM):
No
Grades Breakdown:
Aspect | Percent |
---|---|
Exam | 50% |
Survey and Presentations | 35% |
Homework | 15% |
Representative Textbooks and Other Course Materials:
Title | Author | Year |
---|---|---|
Principles of Information Security, Thomson/Course Technology, ISBN 0-619-21625-5, Third Edition, 2009. | Michael E. Whitman and Herbert J. Mattord |
ABET-CAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Some contribution (1-2 hours) | Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. |
2 | Some contribution (1-2 hours) | Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. |
3 | Some contribution (1-2 hours) | Communicate effectively in a variety of professional contexts. |
4 | Substantial contribution (3-6 hours) | Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles |
5 | Some contribution (1-2 hours) | Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline |
6 | Some contribution (1-2 hours) | Apply computer science theory and software development fundamentals to produce computing-based solutions. |
ABET-ETAC Criterion 3 Outcomes:
(N/A)
ABET-EAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Some contribution (1-2 hours) | an ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics |
2 | Some contribution (1-2 hours) | an ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors |
3 | Some contribution (1-2 hours) | an ability to communicate effectively with a range of audiences - pre-2019 EAC SLO (g) |
4 | Substantial contribution (3-6 hours) | an ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts |
5 | Some contribution (1-2 hours) | an ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives |
6 | Some contribution (1-2 hours) | an ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions |
7 | Some contribution (1-2 hours) | an ability to acquire and apply new knowledge as needed, using appropriate learning strategies |
Embedded Literacies Info:
This course does not have an Advanced Writing Embedded Literacy
This course does not have a Data Analysis – Quantitative Embedded Literacy
This course does not have a Data Analysis – Qualitative Embedded Literacy
This course does not have Technology – Qualitative Embedded Literacy
Attachments:
(N/A)
Additional Notes or Comments:
(N/A)
Basic Course Overview:
CSE_4471_basic.pdf
(10.53 KB)