Course: CIS 1500Division: Business and Applied Tech
Department: Information Technology
Title: Information Security Fundamentals
Semester Approved: Spring 2021
Five-Year Review Semester: Summer 2026
End Semester: Fall 2026
Catalog Description: This course will teach the knowledge and skills required to make clear and conscious decisions about using real world penetration and vulnerability testing tools. Students will learn what mitigation techniques are available and be able to recommend the right one given the scenario. Students will be able to conduct end to end assessments of IoT systems and Networks and identify any vulnerabilities that exist.
Semesters Offered: TBA
Credit/Time Requirement: Credit: 3; Lecture: 1; Lab: 4
Clock/Hour Requirements: 75
Justification: This course is recommended by the program's advisory committee and helps prepare students for the workforce.
The course is required for a certificate and for an AAS degree in Networking and Cybersecurity.
Student Learning Outcomes:
Students will learn end-to-end security techniques to show what vulnerabilities may exist. Students will be assessed with quizzes, hands-on labs, and/or examinations.
Students will gain hands on experience using a virtual simulator of IoT prototypes. Students will be assessed with quizzes, hands-on labs, and/or examinations.
Students will gain knowledge of and be able to recommend mitigation measures for IoT systems and Networks. Students will be assessed with quizzes, hands-on labs, and/or examinations.
Students will use and become familiar with real world penetration and vulnerability testing tools. Students will be assessed with quizzes, hands-on labs, and/or examinations.
Course objectives will be accomplished by providing students with learning experiences in the following areas:
Conduct end to end security assessments of IoT systems to demonstrate vulnerabilities
Gain Hands on experience with IoT prototypes
Recommend threat mitigation measures to minimize the risk in IoT solutions and networks
Become proficient using real-world penetration and vulnerability testing tools such as Kali Linux
The course is designed to foster talent in all students including groups traditionally underrepresented in this career and move beyond stereotypes. Teaching resources will be representative of a variety of experts from diverse backgrounds.
Key Performance Indicators:
Students will be assessed in the following categories:
Knowledge Quizzes 20 to 40%
Hands-on labs 40 to 60%
Hands-on skills examination 0 to 20%
Knowledge/theory examination 0 to 20%
Representative Text and/or Supplies:
Cisco Networking Academy- IOT Fundamentals-IOT Security or Equivalent
The course will be delivered through theory lectures, discussion of real-world scenarios of application and principles, and hand-on projects.
The course will foster inclusivity by:
-providing structured assignments
-connecting with students personally
-limiting high stakes assignments and incorporating assignments with lower point values
Maximum Class Size: 20
Optimum Class Size: 16