I. General Information
1. Course Title:
Security+
2. Course Prefix & Number:
COMP 1127
3. Course Credits and Contact Hours:
Credits: 4
Lecture Hours: 4
Lab Hours: 0
4. Course Description:
This course is designed to provide students with a core understanding of IT Security concepts and methods used in industry today. Subjects covered will include, but not be limited to, the following: authentication, security attacks, malicious code, remote access, e-mail, web security, direct and file transfer services, hacking and anti-hacking utilities, wireless and instant messaging devices, media, network security typologies, intrusion detection, security baselines, cryptography, physical security, disaster recover, and computer forensics.
Career Preparation: The studies in this course will help students prepare for careers such as Security Administrator, Network Administrator, Network Engineer, Systems Analyst, and Systems Engineer, Security Administrator, Cloud Engineer, Security Engineer, IT Auditors, IT Project Manager
5. Placement Tests Required:
6. Prerequisite Courses:
COMP 1127 - Security+
All Course(s) from the following...
Course Code | Course Title | Credits |
COMP 1125 | A+ | 5 cr. |
COMP 1128 | IT Documentation and Support | 3 cr. |
9. Co-requisite Courses:
COMP 1127 - Security+
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
Alexandria Technical College, Alexandria MN
- CVNP 3511 Information Assurance I Security+, 4 credits
Mn State CC and Tech College
- CSEC 1110 Fundamentals of IT Security, 3 credits
Mn State CC and Tech College
- CSEC 2210 Security Breaches & Countermeasures, 3 credits
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Military Experience
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
1. Program-Applicable Courses – This course is required for the following program(s):
Computer Information Technology, AAS
Computer IT Networking & Security, AAS
Computer Information Technology, Diploma
Computer IT Networking & Security, Diploma
Computer CompTIA IT Core, Certificate
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Analyze and follow a sequence of operations |
Explain how to enhance security through mitigation by use of confidentiality, integrity, availability, separation of duties and principle of the least privilege. |
Utilize appropriate technology |
Utilize appropriate tools and security hardening methods in configuration of software/hardware to assess and mitigate risk. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Define information security and explain why it is important;
- Understand risk assessment and mitigation;
- Identify the types of attackers;
- Identify the types of attacks;
- Detect various types of compromise and understand penetration testing and vulnerability scanning concepts;
- Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security;
- Implement secure network architecture concepts and systems design;
- Install and configure identity and access services, as well as management controls;
- Implement and summarize risk management best practices and the business impact; and
- Install and configure wireless security settings and implement public key infrastructure.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Threats, Attacks and Vulnerabilities
- Indicators of compromise and determine the type of malware
- Types of attacks
- Threat actor types and attributes
- Penetration testing concepts
- Vulnerability scanning concepts
- Impact associated with types of vulnerabilities
- Technologies and Tools
- Network components, both hardware- and software-based, to support organizational security
- Software tools to assess the security posture of an organization
- Common security issues
- Output from security technologies
- Deploy mobile devices securely
- Implement secure protocols
- Architecture and Design
- Best practices and secure configuration guides
- Secure network architecture concepts
- Secure systems design
- Secure staging deployment concepts
- Security implications of embedded systems
- Secure application development and deployment concepts
- Cloud and virtualization concepts
- Resiliency and automation strategies reduce risk
- Physical security controls
- Identity and Access Management
- Identity and access management concepts
- Install and configure identity and access services
- Implement identity and access management controls
- Differentiate common account management practices
- Risk Management
- Policies, plans and procedures related to organizational security
- Business impact analysis concepts
- Risk management processes and concepts
- Incident response procedures
- Basic concepts of forensics
- Disaster recovery and continuity of operation concepts
- Types of controls
- Data security and privacy practices
- Cryptography and PKI
- Basic concepts of cryptography
- Cryptography algorithms and their basic characteristics
- Wireless security settings
- Implement public key infrastructure