ITOP 1105: Security Fundamentals
Effective date
September 2021
School
Continuing Studies
Description
In the course students will learn about network security concepts, threats and vulnerabilities, the concept of least privilege, and server hardening. Students will have the opportunity to install and maintain Windows updates, and firewalls, and implement group policy protections.
Year of study
1st Year Post-secondary
Course Learning Outcomes
Upon successful completion of this course, students will be able to:
- Explain security concepts in the context of a network environment
- Differentiate between threats and vulnerabilities
- Install and maintain Windows updates and firewall
- Harden a server against attack
- Recognize and troubleshoot security events
- Explain intrusion prevention systems
- Implement group policy protections
- Protect privacy and confidentiality with encryption
Prior Learning Assessment & Recognition (PLAR)
Please see Program Content Guide.
Hours
Lecture, Online, Seminar, Tutorial: 20
Clinical, Lab, Rehearsal, Shop, Kitchen, Simulation, Studio: 10
Total Hours: 30
Instructional Strategies
In this course students will engage with content through a combination of hands on and scenario-based learning activities. For example, students will create a security check list for a server and troubleshoot different methods to resolve security issues. Students will also research and present on security exploits/vulnerabilities.
Grading System
Letter Grade (A-F)
Evaluation Plan
Type
|
Percentage
|
Assessment activity
|
Lab Work
|
10
|
Completion of each lab plus active participation in each lab (incl. conferring with and helping classmates etc.).
|
Participation
|
10
|
Asking questions, answering questions, participating in Moodle activities and similar activities.
|
Other
|
20
|
Learning Journal which includes a description of what the student learnt in each class.
|
Final Exam
|
25
|
|
Quizzes/Tests
|
35
|
A number of quizzes spread throughout the course
|
Course topics
- Firewalls, Intrusion Prevention System (IDS), Intrusion Detection System (IDS)
Principle of Least Privilege (POLP)
Hardening
Encryption - certificates (public, private, certification authority/chains)
HTTPS Transport Security
Vulnerabilities and threats
Confidentiality, Integrity, and Availability (CIA) Triad
Viruses
Roles, access control, and permissions
Notes:
- Course contents and descriptions, offerings and schedules are subject to change without notice.
- Students are required to follow all College policies including ones that govern their educational experience at VCC. Policies are available on the VCC website at:
https://www.vcc.ca/about/governance--policies/policies/.
- To find out if there are existing transfer agreements for this course, visit the BC Transfer Guide at https://www.bctransferguide.ca.