Optional

CNIT 160: Cybersecurity Responsibilities

Fall 2019 Sam Bowne

Schedule · Lectures · Projects · Links · Home Page

Required

Catalog Description

Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.

Student Learning Outcomes

Upon completion of this course, a student will be able to:
  • Compare security technologies including encryption, storage, and transmission methods
  • Evaluate social and political arguments relating to information security and privacy
  • Engage in healthy and constructive debates that include both technical and political issues around security

Textbook

"CISM Certified Information Security Manager All-in-One Exam Guide 1st Edition" by Peter H. Gregory
Publisher: McGraw-Hill Education; 1 edition (March 19, 2018)
ISBN: 1260027031
Buy from Amazon ($35)

Quizzes

The quizzes are multiple-choice, online, and open-book. Study the textbook chapter and take the quiz before that class. Each quiz is due 30 min. before class. Each quiz has 5 questions, you have ten minutes to take it, and you can make two attempts.

To access the quizzes:

  • Go to https://canvas.instructure.com/enroll/NH6YBB
  • If you've taken one of my class previously, you should already have an account on this Canvas server (it's NOT the usual CCSF Canvas system). Otherwise, create a new account.
  • You should see the course, including the quizzes, as shown below.
  • After you have joined the course, you can access it at canvas.instructure.com
  • Questions? Email CNIT.160@gmail.com

Live Streaming

To join the livestream, use this Zoom link:

https://zoom.us/j/4108472927

Classes will also be recorded and published on YouTube for later viewing.

Email

For class-related questions, please email
CNIT.160@gmail.com

Schedule (may be revised)

Mon 8-19  1 Becoming a CISM
Mon 8-26Quizzes: Ch 1 & 2a * 2 Information Security Governance
Mon 9-2 Holiday: No Class
Fri 9-6 Last Day to Add?
Mon 9-9Quiz: Ch 2b *
Proj 1 & 2 due
2 Information Security Governance
Mon 9-16Quiz: Ch 3a
Proj 3 due
3 Information Risk Management
Mon 9-23Quiz: Ch 3b
Proj 4 & 5 due
3 Information Risk Management
Mon 9-30Quiz: Ch 4a
Proj 6 due
4 Information Security Program Development and Management
Mon 10-7Quiz: Ch 4b
Proj 7 & 8 due
4 Information Security Program Development and Management
Mon 10-14Quiz: Ch 4c
Proj 9 due
4 Information Security Program Development and Management
Mon 10-21No Quiz
No Proj due
Guest: TBD
Mon 10-28Quiz: Ch 4d
Proj 10 & 11 due
4 Information Security Program Development and Management
Mon 11-4Quiz: Ch 5a
Proj 12 due
5 Information Security Incident Management

Mon 11-11 Holiday: No Class
Mon 11-18Quiz: Ch 5b
Proj 13 & 14 due
5 Information Security Incident Management
Mon 11-25No Quiz
No Proj due
Topic TBA
Mon 12-2No Quiz
No Proj due
Topic TBA
Mon 12-9No Quiz
No Proj due
Last Class: Topic TBA
Thu 12-13 -
Thu 12-20
Final Exam available online throughout the week.
You can only take it once.

All quizzes due 30 min. before class
* No late penalty until 9-16

Lectures

Grading Policy

1 Becoming a CISM

2 Information Security Governance

Introduction to Information Security Governance
Security Strategy Development

3 Information Risk Management

Risk Management Concepts
Implementing a Risk Management Program
The Risk Management Life Cycle
Operaational Risk Management

4 Information Security Program Development and Management

Information Security Programs
Security Program Management
Security Program Operations
IT Service Management
Controls
Metrics and Monitoring
Continuous Improvement

5 Information Security Incident Management

Security Incident Response Overview
Incident Response Plan Development
Responding to Security Incidents
Business Continuity and Disaster Recovery Planning

Projects (not ready yet)

Links

Radix Economic Model (1-31-19)
60% of small companies that suffer a cyber attack are out of business within six months.

Last Updated: 4-4-19