|
May 11, 2025
|
|
|
|
2022-2023 College Catalog [ARCHIVED CATALOG]
|
CIS 133 - Fundamentals of Personal Computer Security 3 Credits, 3 Contact Hours 3 lecture periods 0 lab periods
Introduction to Personal Computer (PC) security and how to protect from outside threats. Includes an overview of cyber crime and security issues; networks and the Internet; assessing a personal computer system; denial of service attacks; malware; basics of securing a PC system; and data encryption. Also includes Internet fraud and security; examples of espionage in cyberspace; cyber detective work; and computer security hardware and software.
Recommendation: Completion of CIS 104 /CSA 104 and familiarity with the Internet are recommended before enrolling in this course. If any recommended course is taken, see a financial aid or Veteran’s Affairs advisor to determine funding eligibility as appropriate.
.png)
Course Learning Outcomes
- Discuss the various types of computer virus attacks.
- Install appropriate software tools on personal computers (PC) to foil attacks.
- Discuss the use of Internet Protocol (IP) addresses and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports.
- Discuss the basic aspects of securing a personal computer system.
- Install and use appropriate software tools to monitor activity.
- Discuss fraud and cyber crime topics of importance.
- Discuss encryption of data and the importance of encryption.
Outline:
- Overview of Cyber Crime and Security Issues
- Networks and the Internet
- Open System Interconnection (OSI) model
- Internet Protocol (IP) addressing and Transmission Control Protocol (TCP) ports
- Basic network tools and their use
- Assessing a Personal Computer System
- Denial of Service Attacks
- Malware
- How viruses work
- Trojan horses
- Spyware
- Detecting and eliminating viruses and spyware
- Basics of Securing a Personal Computer System
- Shutting down a service in Windows
- Installing a firewall
- Safe Web surfing
- Data Encryption
- Introduction to data encryption
- Cryptography basics
- Modern methods of encryption
- Internet Fraud and Security
- Fraudulent offers and advice
- Online identify theft
- Protecting against cyber crime
- Securing browser settings for Internet browser programs
- Examples of Espionage in Cyberspace
- Cyber Detective Work
- Court records and criminal checks
- General searches
- Computer Security Hardware and Software
- Virus scanning software
- Firewalls
- Anti-spyware software
- Intrusion detection software
|
|