Jan 23, 2022  
2021-2022 College Catalog 
    
2021-2022 College Catalog
Add to Portfolio (opens a new window)

CIS 133 - Fundamentals of Personal Computer Security

3 Credits, 3 Contact Hours
3 lecture periods 0 lab periods

Introduction to Personal Computer (PC) security and how to protect from outside threats. Includes an overview of cyber crime and security issues; networks and the Internet; assessing a personal computer system; denial of service attacks; malware; basics of securing a PC system; and data encryption. Also includes Internet fraud and security; examples of espionage in cyberspace; cyber detective work; and computer security hardware and software.

Recommendation: Completion of CIS 104 /CSA 104  and familiarity with the Internet are recommended before enrolling in this course. If any recommended course is taken, see a financial aid or Veteran’s Affairs advisor to determine funding eligibility as appropriate.
  button image Prior Learning and link to PLA webpage

Course Learning Outcomes
  1. Discuss the various types of computer virus attacks.
  2. Install appropriate software tools on personal computers (PC) to foil attacks.
  3. Discuss the use of Internet Protocol (IP) addresses and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports.
  4. Discuss the basic aspects of securing a personal computer system.
  5. Install and use appropriate software tools to monitor activity.
  6. Discuss fraud and cyber crime topics of importance.
  7. Discuss encryption of data and the importance of encryption.

Outline:
  1. Overview of Cyber Crime and Security Issues
  2. Networks and the Internet
    1. Open System Interconnection (OSI) model
    2. Internet Protocol (IP) addressing and Transmission Control Protocol (TCP) ports
    3. Basic network tools and their use
  3. Assessing a Personal Computer System
  4. Denial of Service Attacks
  5. Malware
    1. How viruses work
    2. Trojan horses
    3. Spyware
    4. Detecting and eliminating viruses and spyware
  6. Basics of Securing a Personal Computer System
    1. Shutting down a service in Windows
    2. Installing a firewall
    3. Safe Web surfing
  7. Data Encryption
    1. Introduction to data encryption
    2. Cryptography basics
    3. Modern methods of encryption
  8. Internet Fraud and Security
    1. Fraudulent offers and advice
    2. Online identify theft
    3. Protecting against cyber crime
    4. Securing browser settings for Internet browser programs
  9. Examples of Espionage in Cyberspace
  10. Cyber Detective Work
    1. Court records and criminal checks
    2. General searches
  11. Computer Security Hardware and Software
    1. Virus scanning software
    2. Firewalls
    3. Anti-spyware software
    4. Intrusion detection software


Effective Term:
Fall 2015



Add to Portfolio (opens a new window)