ITOP 2204: Computing Security Architecture
Effective date
September 2021
School
Continuing Studies
Description
Students will learn the principles, concepts, and jargon involved with the security of information technology systems and data. This course involves a large degree of discussion and research. Students will learn about professional terms used to describe security concepts, and common threats and defences to information technology systems. The learner should be familiar with the basic usage and configuration of server and desktop operating systems.
Year of study
2nd Year Post-secondary
Prerequisites
ITOP 1103; ITOP 1108.
Course Learning Outcomes
Upon successful completion of this course, students will be able to:
- Compare and contrast computer worms and viruses, and their lifecycle
- Identify types of malware and attacks and the damage they cause
- Identify methods to update defences against attacks
- Identify methods of assessing threats and vulnerabilities
- Explain solutions to help mitigate wireless network attacks
- Describe the concepts of business continuity and recovery options
Prior Learning Assessment & Recognition (PLAR)
None
Hours
Lecture, Online, Seminar, Tutorial: 54
Total Hours: 54
Instructional Strategies
Students will engage with the material through a combination of interactive learning methods, such as hands-on activities, case studies, simulations, group work/discussions, demonstration and troubleshooting of problem-based tasks, projects, and exams.
Grading System
Letter Grade (A-F)
Evaluation Plan
Type
|
Percentage
|
Assessment activity
|
Assignments
|
40
|
Four take-home assignments
|
Assignments
|
10
|
One in-class assignment
|
Quizzes/Tests
|
20
|
Two quizzes
|
Final Exam
|
30
|
|
Course topics
- Information security and its challenges
Attacks and attackers
Viruses, worms, and malware
Social engineering
Vulnerability- scanning, assessment, techniques, and tools
Penetration testing
Security - application, computer, data
Types of network security devices
Network - protocols, address translation, and control
Access control and models
Authentication services and credentials
Account management procedures
Trusted operating systems
Cryptography
Digital certificates
Public Key Infrastructure (PKI)
Transport encryption algorithms
Environmental controls
Redundancy planning
Disaster recovery procedures
Incident response procedures
Learning resources
Comptia Security + Get Certified Get Ahead Study Guide
Notes:
- Course contents and descriptions, offerings and schedules are subject to change without notice.
- Students are required to follow all College policies including ones that govern their educational experience at VCC. Policies are available on the VCC website at:
https://www.vcc.ca/about/governance--policies/policies/.
- To find out if there are existing transfer agreements for this course, visit the BC Transfer Guide at https://www.bctransferguide.ca.