0% found this document useful (0 votes)
90 views8 pages

INF 203 Information Security Syllabus

Uploaded by

abilkhandulat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views8 pages

INF 203 Information Security Syllabus

Uploaded by

abilkhandulat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Course Syllabus

Course Code: _____INF 203_________________________________


Department: _____Information Systems____________________________
Course Title: _____Information Security_________________
Semester: _____spring_____________________________________
Credits/ECTS: _____5__________________________________________
Degree Cycle (Level): _____Undergrad.__________________________________
Course Type: _____Elective____________________________________
Language of Instruction: __English_____________________________________

Requisites

The table below is automatically filled in if it is included in the Education Program


Type Progra Educational program Course Title Consent status
m
Code

● AR 10XXX

● CR (Co
requisite)

● PR
(Prerequisite)

Programmes on which course is available

If your course is taught in another Educational Program, that Educational Program


automatically will be displayed in this table
Program Program Title Degree Program Learning
Code Outcome
● LO1

● LO2

Mode of Delivery
● Face to Face
● Online
● Hybrid

Course Description

Discover the core principles and practices of Information Security in this comprehensive course.
Gain insights into cybersecurity threats, learn to design secure systems, and understand network
security essentials. Delve into cryptography, security policies, and incident response strategies.
This course combines theory with hands-on exercises, making it ideal for IT professionals and
those looking to bolster their security knowledge. Enroll now to navigate the digital landscape
with confidence and safeguard valuable information.

Instructor (s)
Name Surname Degree Contact information

1. Gulsim Rysbayeva Doctor PhD [email protected] du.kz

2. Alfarabi Serik MSc [email protected]

3. Azamat Amangeldiyev MSc [email protected]

3. Shakhnazar-Sultan BSc [email protected]


Manbay

4. Farikha Nauruzbayeva BSc [email protected]


Skills and competences
Academic Skills Subject-Specific Skills

Cybersecurity Knowledge Understanding of threats, vulnerabilities,


and security best practices.

Analytical thinking and problem-solving skills Identifying and analyzing security


incidents, developing creative solutions
for security challenges.

Teamwork and Leadership Collaborating with teams, providing


leadership during security incidents.

Security Architecture Design and implementation of secure


systems, applying defense-in-depth
strategies.

Ethical Hacking and Penetration Testing Conducting ethical hacking and


penetration tests to identify and address
vulnerabilities.

Incident Response Development and execution of incident


response plans, rapid identification, and
containment.

Risk Management Assessing and mitigating risks to


information security, applying risk
management frameworks.

Weekly course plan


№ Topics Activity

1 Introduction to Information Security 1. Practice Activity


(CIA triad)

2 Ethical Hacking Fundamentals 1. Practice Activity


3 Information Security Threats and 1) Assignment 1
Vulnerabilities 2) Practice Activity

4 Cryptography and Steganography


1. Assignment 1
2. Quiz 1
3. Practice Activity

5 Cyber Reconnaissance 1. Assignment 2


2. Practice Activity
3. TOR

6 Authentication, authorization, and 1. Practice Activity


accounting (AAA)

7 Incident Response and Management 1. Practice Activity

8 Social Engineering Techniques and


Countermeasures 1. Quiz 2
2. Practice Activity

9 Ethical Hacking and Penetration Testing 1. Practice Activity

Web Application Vulnerabilities Midterm Exam


10
1. Assignment 3
2. Practice Activity

11 Network Attacks and Security


1. Practice Activity

12 Network Traffic Monitoring 1. Assignment 4


2. Quiz 3
3. Practice Activity

13 Information Security Risk Management 1. Practice Activity


14 Report (Web Test) 1. Practice Activity

15 Report (Web Test) 1. Practice Activity

Course Learning Outcomes


Active verb What will be done/produced How this learning
outcome will be
achieved

Demonstrate Course assignments Via completion of course


Understanding of readings, class activities,
Information Security. and lab assignments
Articulate fundamental
principles; understand
confidentiality, integrity, and
availability's role in
information security.

Identify and Analyze Course assignments Via completion of course


Cybersecurity Threats readings, class activities,
Recognize common threats, and lab assignments
analyze attack vectors, and
understand malware,
phishing, and social
engineering.

Design and Implement Course assignments Via completion of course


Secure Systems readings, class activities,
Apply security architecture and lab assignments
principles, implement
defense-in-depth strategies
for varied threats.
Conduct Ethical Course assignments Via completion of course
Hacking and readings, class activities,
Penetration Testing and lab assignments
Identify vulnerabilities
through ethical hacking,
conduct penetration tests,
and provide
recommendations for
improvement.
Apply Problem-Solving Course assignments and Via labs and quizzes
and Analytical Skills. quizzes
Identify and analyze
security incidents and
vulnerabilities, develop
creative solutions for
enhanced security.
Demonstrate Course project Via completing labs
Leadership and Team
Collaboration.
Provide leadership
during security incidents,
collaborate effectively
with cross-functional
teams for common
security goals.

Planned Learning Activities and Teaching Method

● Lecture
● Questions & Answer
● Problem Solving
● Other
*if other _______________________
Reading List
Type Author Title Publishi ISBN Publish
ng year er/ Web
site

● Larry Conklin Threat Modeling https://


Recommende Process owasp.
d 2022 org/
www-
comm
unity/
Threat
_Mode
ling_P
rocess
● AAA Identity 2010 978158
Management 714156
Recomme Security 0
nded

● Other

Assessment Methods and Criteria

The University’s normative rules regarding assessment apply. See the Code of Practice on
Assessments.
These norms set the boundary conditions for all instructors of University.
Assessment Description Quantity %

● Pre-final Assignments 4 25

● Pre-final Quiz 3 15

● Pre-final Midterm 1 20

● Final Final Exam 1 40

bonus? Platform/Academies 5

Total 100

Student Workload
Activity Quantity Duration Total Hours

Lecture 15 2 30

Practice 15 1 15

Student’s work 40-50

Total Workload 85-95


Academic Integrity

Students must ensure that all work completed for this course is their own work. Any evidence of
plagiarism, data falsification, fabrication, collusion, self-plagiarism and/or other forms of
academic misconduct will be penalized. Further, information can be found in the Code of Practice
on Academic Integrity.

Late/Non Submission and Attendance Policy

Academic excellence and high achievement are only possible in an environment where the
highest standards of academic honesty and integrity are maintained: students at SDU must ensure
they adhere to this requirement. Active participation is an integral part of teaching and learning
at SDU. Therefore, regular class attendance is required of all students and records of any
absences are kept for each class: a student whose attendance falls below 30% will fail the course.
Students are also expected to be in class on time: poor punctuality is seen as being discourteous
to the teacher and other students, therefore repeat incidences of late arrivals are subject to a
penalty. The use of electronic devices (e.g.: computers, tablets, phones) is only permitted upon
tutor instruction. Any other activities (e.g.: texting, surfing, gaming, social emails, online
shopping...etc.) are strictly forbidden during class time. Students found to be engaged in any
non-class activity may lose marks for overall participation.

Course Specific Policy

● The course content in this syllabus can be modified, the instructor will share the rationale
for the modifications with the students.
● Late work is not accepted. Deadlines are not extended. No additional assignments are
given for an opportunity to improve grades. Students asking to increase grades for no
reason will be penalized by minus points (“I need it for maintaining the scholarship”
and similar arguments are unacceptable).
● Syllabus can be changed according to lecture or instructor(will be announced in advance)
Please be aware that if cheating is detected, severe consequences will be imposed.
Specifically, a grade of 0 (zero) will be assigned for the entire course. Please take academic
integrity seriously, and any breach of these principles undermines the trust and credibility
of the educational experience.

Approved by Head of Department

_____________________________________________________________________________

You might also like