Syllabus – IAS3263 Fall 2010 -1IAS3263 Security Architecture and Design. INSTRUCTOR: OFFICE PHONE: OFFICE HOURS: OFFICE: E-MAIL: PREREQUISITE: IAS 3063. REQUIRED TEXT: Security Architecture: Design, Deployment and Operation. McGraw Hill. Christopher King, Ertern Osmanoglu and Curtis Dalton. CATALOG COURSE DESCRIPTION: Students will configure a secure network and an intrusion detection system. Network monitoring plans and bandwidth management plans will be created. Policies and procedures will be created. A basic forensics data report will be assigned. Lecture 3 hours. Prerequisite IAS 3063. COURSE OBJECTIVES: Students will configure a secure network. (BS - SLO 01 – SLO 02) Students will configure an intrusion detection system. (BS - SLO 01 – SLO 02) COURSE FORMAT: The strategy for this course calls on the student to be an active participant in the learning process. Students must prepare in advance each topic to be covered in class and as part of their preparation they must make home works which come directly from the class’ book. Usually students have to discuss topics with class mates. The instructor expands upon key concepts with comments and examples provided by the book and class slides. The course includes interactive instructor lecture, team discussions in class and students presentations. ACTIVE vs. PASSIVE LEARNING 1: Studies indicate that students retain: 10% of what they read; 20% of what they hear; 30% of what they see; 50% of what they see and hear; 70 % of what they say; and 90% of what they say as they do. Adult learners learn better if they are ACTIVELY involved in the learning process! The following has been adapted from the West Virginia Department of Psychology Undergraduate Handbook 1 Kimberly Merrit. Sillabus MIS Spring 2007. Cameron University. Computing & Technology Department. 1 Syllabus – IAS3263 Fall 2010 -2(http://www.as.wvu.edu/psyc/Undergraduate/Handbook/StudentSuccess/actpass.htm ) Active: Come to lectures prepared, pay attention, take notes, participate in discussions, and asks questions. Active: Take your own notes. Active: Skim assignments first, make up a list of questions they want answered, and then read the assignment to answer the questions. Active: Study returned tests so they don’t make the same mistake again. Active: Volunteer to help others in class who are having trouble. Active: Participates in the learning environment, making choices, looking for answers outside of the class environment. Active learners want deep learning. Deep learning is insightful learning. Deep learners look for the meaning behind the learning. BLACKBOARD: Blackboard (http://blackboard.cameron.edu/ ) will be used throughout the course to provide a forum for disseminating information, group work, discussions, and for exams. The correct blackboard course in which to enroll is: Security Architecture and Design– Fall 2010 IAS3263. The Password for self-enrolling is IAS3263 Appendix A…. INFORMATION TECHNOLOGY PROGRAM OUTCOMES AAS INFORMATION TECHNOLOGY Upon completion of the program, the student must meet the following criteria (Cat Department, 2006). The student: SLO-01. must understand and demonstrate application of a high ethical standard SLO-02. must understand the impact that information technology has on society as a whole and must know the importance of continual learning SLO-03. must possess the ability to communicate in a variety of settings using oral, written, multimedia techniques to a variety of audiences and must interact with and understand diverse groups using a strong IT vocabulary SLO-04. must be able to choose from a variety of different problem solving methodologies to analytically formulate a solution using a high level programming language SLO-05. must understand the planning, performing, and evaluation process as it relates to information technology operations and must understand system phases, and the Systems Development Life Cycle (SDLC) SLO-06. must understand basic computer networks infrastructure and demonstrate proficiency in assembling, configuring and administering networks BS INFORMATION TECHNOLOGY 2 Syllabus – IAS3263 Fall 2010 -3Upon completion of the program, the student must meet the following criteria (Carroll, BS in IT Proposal, 2006). The student: SLO-01. must analyze, identify, and define the requirements that must be satisfied to address problems or opportunities faced by organizations or individuals applying current technical concepts and practices in the core information technologies; SLO-02. must design effective and usable IT-based solutions and integrate them into the user environment; SLO-03. must demonstrate an understanding of best practices and standards and their application in order to identify and evaluate current and emerging technologies and assess their applicability to address the users’ needs; SLO-04. must analyze the impact of technology on individuals, organizations, and society, including ethical, legal, and policy issues; SLO-05. must demonstrate independent critical thinking and problem solving skills; SLO-06. must communicate effectively and efficiently with clients, users, and peers both verbally and in writing, using appropriate terminology and must collaborate in teams to accomplish a common goal by integrating personal initiative and group cooperation 3