Spring 2010 Class Schedule (CRC)



Back to Previous Page

CISS 300    Introduction to Information Systems Security    1 Unit

Prerequisite: None
Advisory: Some experience and/or coursework in networking.
Course Transferable to CSU
Hours: 18 hours LEC
Description: This course provides an introduction to network-based and Internet-based security applications and standards. Topics include cryptography, security protocols, network security applications, encryption, hash functions, digital signatures, viruses and key exchange.

Schedule: Eight Week - First, Jan 16-Mar 15
TBA       TBA             LEC J.Spisak             CRC MAIN Online          21491 
Textbook
Class 21491 is online.
Online Orientation. For the orientation and more information please go to Adj Professor Spisak's' Web site at http://crc.losrios.edu/spisakj
For additional online course information go to http://crc.losrios.edu/de
Required attendance for on campus final.
Final: Saturday, March 13, 2:00 p.m.-3:50 p.m., BS-153
The main goal of the course is to provide students with a comprehensive overview of computer and network security issues including the numerous types of attacks computers are vulnerable to, the types of attacker profiles, and the hardware and software defense solutions available. The course begins with an overview of the subject including security goals, the importance of security, intruder profiles, and defense mechanisms. The topics subsequently covered include security and the individual personal computer in both the home and corporate environments. This includes protecting the single device from the threats of data theft, viruses and spyware, techniques of authentication and security patch management. Next, corporate security is presented including policy issues involving e-mail, Internet access, passwords, Incident Response and Disaster Recovery. Internet Security and Network Security are addressed focusing on the threats to WAN and LAN networks and methods of protecting each type of network. Students will learn to apply these concepts to each particular setting and know how and why they are adapted from one environment to another.
For additional online course information go to http://www.crc.losrios.edu/de


CISS 350    Disaster Recovery    3 Units

Prerequisite: CISS 310 with a grade of "C" or better.
Course Transferable to CSU
Hours: 48 hours LEC ; 18 hours LAB
Description: This course teaches students how to identify network vulnerabilities and how to take the appropriate countermeasures to prevent and mitigate failure risks for an organization. Students will gain an understanding of the steps needed for good disaster recovery including, how to prepare a disaster recovery plan, the various risks associated with an enterprise network, the diverse job functions of employees in a Disaster Recovery Plan, and the methods needed to implement a plan once it is complete. In addition, each student will develop a Disaster Recovery Plan with a group for a real or fictitious organization.

Schedule: Eight Week - First, Jan 16-Mar 15
TBA       TBA             LEC L.Parks              CRC MAIN Online          31727 
Textbook
W         06:00PM-08:05PM LAB L.Parks              CRC MAIN BS 153            
Hybrid class - Partly Online/Partly Classroom
For the orientation and more information please go to Professor Parks' Web site at http://www.professorparks.org/spring2010.html This course covers incident response issues in extensive detail. It provides a step-by-step process to develop, implement, and manage a disaster recovery plan that can be applied to any organization. It also features extensive learning tools, including Review Questions, Hands-On Projects, and Case Projects, which allow students to practice skills as they are learned.


CISS 360    Computer Forensics and Investigation    3 Units

Prerequisite: CISS 310 with a grade of "C" or better.
Advisory: CISC 308.
Course Transferable to CSU
Hours: 48 hours LEC ; 18 hours LAB
Description: This course is an introduction to the methods used to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Topics covered include an overview of computer forensics as a profession; the computer investigation process; understanding operating systems boot processes and disk structures; data acquisition and analysis; technical writing; and a review of familiar computer forensics tools.

Schedule: Eight Week - Second, Mar 16-May 13
TBA       TBA             LEC L.Parks              CRC MAIN Online          31729 
Textbook
W         06:00PM-08:05PM LAB L.Parks              CRC MAIN BS 153            
Hybrid class - Partly Online/Partly Classroom
For the orientation and more information please go to Professor Parks' Web site at http://www.professorparks.org/spring2010.html This course provides step-by-step explanations on how to use some of the most popular forensic tools. It maps to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification to provide credible, standard-based information. Students will also have access to free software so they may work on case studies, giving them the opportunity to test their new skills and tying the content to professional practice.

Spring 2010 Class Schedule

Updated: July 30, 2010