ITC183-Intro Cybersecurity-Levin-Spring2024-Syllabus
ITC183-Intro Cybersecurity-Levin-Spring2024-Syllabus
cs.salemstate.edu
Spring 2024
SYLLABUS
--------------------------------------------------------------------------------------------------------------------------
Instructor: Benjamin Levin
Email: [email protected]
Office: Best – communicate online. Office: MH207D Phone: (978) 542-2835
Office Hours: Online by appointment
--------------------------------------------------------------------------------------------------------------------------
All classes will be held on Zoom according to the original schedule (“synchronously”):
Please note:
• Detailed course class-by-class content, required readings, assignments/projects/labs/quizzes/exams, links
to additional multimedia materials will be on Canvas as always.
• Please now do diligently check your emails and course announcements. As always, I will update the file
“Course progress” on Canvas every week, so you all know where we are and what is ahead.
• Important: 30 minutes before the class I will send you the link to the Zoom meeting or Meeting
ID/Password.
• I will be taking attendance every class.
Catalog description:
How safe are you in the digital world? Hackers are trying to get access to your private information, to use your
identity and to impersonate you while conducting criminal activity, viruses are trying to destroy your computer. Do
you know how to protect yourself and the rules you must follow to make your digital universe safe? If not – this
course is for you. It provides an overview of computer and network security - one of the main issues, facing the
Internet community today. Computers worldwide are under attack by hackers, organized crime, and foreign
governments, with potentially disastrous results for individuals, organizations, and even states. This course presents
a user-level view of computer security and includes discussion of topics you must know to be safe as individuals
and future members of the work force, functioning in the global digital world.
Prerequisites: High school algebra I and II.
Forecast of Course Offering: Twice a year.
Course Narrative:
The overall purpose of the course is to foster an understanding of problems and solutions in computer and
network security and to prepare students to function in the global Internet world in a safe and secure fashion as
individuals and employees.
Students will learn fundamental principles of “Information Security” – what is it, what topics are covered by this
title, and why this issue is so important in the contemporary computing environment. Students will learn
fundamentals of computer architecture and networking from a security point of view. After that, students will
explore dangers that people face as members of World Wide Web as individual users and employees of companies,
Page 1 of 10
whose Information Technology environments protect the most valuable asset they have – information.
After students understand fundamental concepts of Information Security, they will learn particular methods and
tools that are used to analyze their computer environment from a security point of view, rules of proper behavior in
the digital world, and policies and procedures, employed by companies to protect their IT environments. Students
will learn about hackers (who they are and why they do what they do) and their methods – from purely technical
tools that exploit vulnerabilities of IT environments to non-technical methods of information gathering (such as
“social engineering”). Doing assignments students will have a chance to use simple tools that will enable them to
protect data, evaluate security of their systems and Web services they use, analyze possible threats, learn rules of
proper behavior on the Internet, and minimize their footprint and visibility on the Internet. Knowledge of security
mechanisms and tools is not restricted to PCs/Laptops, but also includes smartphones (mobile computing security).
Course Goals:
Upon completion of this course, students will:
CG1: Develop an understanding of basic principles of computer and network security;
CG2: Describe security issues facing users and mechanisms/tools used to improve computer and network
security;
CG3: Become familiar with computer and network security assessment methods;
CG4: Become familiar with rules of proper behavior in the digital world (as individual and employee);
CG5: Develop an understanding of organizational methods used by companies to ensure security of their IT
infrastructures;
CG6: Develop an appreciation for the complexity of the Information Technology security infrastructures,
employed by companies;
Table of contents:
Student Experiences:
The emphasis of the course is on the understanding of the issues in Information Security and experience in usage of
security tools and mechanisms, necessary to individual users and employees. Extensive laboratory exercises will
involve use of these tools and mechanisms in order to minimize security threats to individuals and companies.
Students will be encouraged to do independent analysis of different environments (for example their home networks)
and design methods of dealing with security problems. There will be individual and group projects teaching students
to analyze real cases of security breach and deal with security issues presented by different scenarios. Especial
attention will be paid to importance of Information Security for future employees.
Page 4 of 10
of class meetings. Each student is responsible for completing all course requirements and for keeping up
with all that goes on in the course (whether or not the student is present).
Assignments:
Given weekly (approximately), assignments require students to use information given during the lectures and may
need to refer to the lecture slides, textbook, and/or perform Internet research for necessary materials. Each
assignment has a specific due date, with a short grace period during which the assignment may be submitted for
reduced credit. When the grace period has expired, the assignment will no longer be accepted, and a student who
has failed to submit the assignment will have a penalty deducted from the term point-total. Other than the labs,
there will be homework, quizzes, midterm, and a final.
Tools: Through the use of software tools (applications downloaded from the Internet), you will exercise
theoretical principles discussed during the lectures through practical hands-on exercises.
Reports: Assignments will result in Reports, submitted through Canvas. Follow the guidelines (if any) provided
by the instructor for writing the reports.
Presentations: I want each one of you to make a presentation on one of the topics that I find interesting; there is a
list of topics and you will be able to choose from the list.
Course Schedule
This course is online synchronous, i.e. we will meet on Zoom according to schedule (please, learn how to
download, install, and use Zoom application). I will send an email with meeting invitation about 30 minutes
before the start of each meeting. There is a file in the first module on Canvas called “Course progress”. Every
course runs slightly differently and so that you can see where we are at every moment, I will edit this file
every couple of weeks.
Course Management:
• Course Login (Canvas): http://elearning.salemstate.edu
• Communicating with the Instructor:
To communicate with me PLEASE USE [email protected]. You will get response from me as soon as
I can handle all the emails I get (in a day or two). YOU MUST start the Subject line with “ITC183”
Page 5 of 10
and your name (how it is recorded on Canvas) because I have more than one course and your email name
does not always make it clear who you really are.
• Zoom invitation:
You will receive invitations to Zoom meetings (classes) in your SSU Email about 15 minutes before each
class begins.
• After the class:
After the class you will receive an email from me with:
o What we did today in class
o What is your assignment
• Syllabus:
Please read the entire course syllabus. Many inquiries at the beginning of the course usually contain
questions already covered in the syllabus. If you don’t understand something in the syllabus, please send
me an email asking for clarification.
Course Participation:
Each student is responsible for completing all course requirements and for keeping up with all that goes on in the
course (whether or not the student is present in class), as well as making sure coursework is properly submitted for
grading. It is student’s responsibility for submitting the coursework on time, properly, and making sure his/her
submissions were accepted and graded. Throughout the semester, please check and double check to make sure you
have completed the coursework. Any missing, late, or incomplete coursework, or coursework not submitted,
would be assigned grade of ZERO unless you communicated with me beforehand.
Page 6 of 10
Most Chapters have “required reading” material and after each Chapter there will be a quick simple quiz
to test your understanding of the material. Each quiz will consist of 8 questions (True/False, Multiple
choice, Fill blanks, etc.)
• Exams (2) 16 8 each
The Midterm exam will cover Parts I and II, the Final Exam will cover the whole course.
--------------------------------------------------------------------------
Total 100 points (100%)
Note, that each course progress is slightly different, it depends on how many students are in class, how well
they understand computers and how diligent are they in doing assignments. As a result, the total number of
points might change slightly (for example, there might be less then 12 quizzes) but, of course, the total
number will always be 100%. To help you, on Canvas I will keep a file called “Course progress” which I will
update every week so that you will always know where are we in the course.
Students will be able to pick up additional points (to compensate for missing grades) doing presentations on
subjects provided by the professor (5 point each) and the course analysis report paper.
All students should expect to invest approximately three hours per week in class attendance and
approximately six hours per week of course-related work to be completed outside of class meetings.
The numeric final grade will be converted to a letter grade based on the following grading system adopted by
the college. This letter grade will be submitted as the official grade for the course.
Main resources:
• Canvas website with lecture-by-lecture topics, quizzes, assignments, and exams.
• No textbook
Use of Electronics
Do not forget to turn off your cell phones! Text messaging, wearing headphones and loud conversations are
considered disruptive behaviors and will be handled in accordance with the University policy. The use of
portable electronic devices, i.e., laptops, tape recorders, and cameras, is not permitted at any time during the
class (!).
In the cases where a grade is “on the line” attendance may be used to determine whether the student put effort
into the course or not. Because almost every class includes lecture and assignments are graded, attendance can
be translated into grades. Each student is responsible for completing all course requirements and keeping up
with all what is goes on in the course whether or not the student is present.
Each student is responsible for completing all course requirements and for keeping up with all that goes on in
the course (whether or not the student is present).
Missed Exams:
Missed tests/quizzes/exams will be made up as soon as it is humanly possible. The student is responsible for
notifying me that he/she will miss a test/quiz and make arrangements for make-up. I will allow a student to take
missed exam later but only in case of really serious circumstances.
Most important: ALWAYS talk to me if you have troubles in understanding the material or personal
issues! I will do whatever I can to help and accommodate your needs. If you do not talk to me (or just
disappear for a prolonged period of time) I will automatically apply the rules.
Bibliography:
References:
• Mark Ciampa. Security+ Guide to Network Security Fundamentals. Course Technology, 2008
• Shon Harris, Gray Hat Hacking. McGraw-Hill Osborne Media, 2007
• H.X. Mel and Doris Baker. Cryptography Decrypted. Addison-Wesley Professional, 2000
• Bruce Schneier, Secrets and lies: Digital Security in a Networked World. John Wiley and Son, 2004.
• Kevin D. Mitnick. The Art of Intrusion, 2004
• Kevin D. Mitnick. The Art of Deception, 2005
Page 8 of 10
• Safe Browsing AP http://googleonlinesecurity.blogspot.com/2008/05/safe-browsing-diagnostic-to-rescue.html
• Internet articles about security multiple links
Academic regulations:
All students are expected to be familiar with the academic regulations, including those regarding Academic
Integrity, for Salem State University as published in the college catalog. In addition, each student is responsible
for completing all course requirements and for keeping up with all that goes on in the course (whether or not the
student is present).
“Student” technology failure does not constitute a declared critical emergency at Salem State. However, I
know it is considered “critical” to you so have a backup plan for completing course requirements and labs. Get to
know where the open access computer labs are on campus. Be prepared to go to these labs if your “crisis” is
occurring on or near a due date! Lost files? Well, the content matter for this course is “computing.” You will
NOT have the excuse you lost your files or USB drive because you will have a backup plan in effect at all times
during the semester so you can produce all files if needed at any time during the semester.
Equal access:
Salem State University is committed to providing equal access to the educational experience for all students in
compliance with Section 504 of The Rehabilitation Act and The Americans with Disabilities Act and to providing
all reasonable academic accommodations, aids and adjustments. Any student who has a documented disability
requiring an accommodation, aid or adjustment should speak with the instructor immediately. Students with
Disabilities who have not previously done so should provide documentation to and schedule an appointment with
the Office for Students with Disabilities and obtain appropriate services.
To officially withdraw from this course, you MUST fill out the appropriate withdrawal form and file it with the
Registrar by the deadline specified in the academic calendar. If you officially drop this class on or before the
deadline, you will receive a "W" indicating withdrawal on your transcript. Unofficial withdrawal (not attending,
without filing an official drop form with the Registrar's office by the withdrawal deadline) would result in a grade
of "F."
Page 9 of 10
Emergency:
In the event of a university declared critical emergency, Salem State University reserves the right to alter this
course plan. Students should refer to salemstate.edu for further information and updates. The course attendance
policy stays in effect until there is a university declared critical emergency. In the event of an emergency, please
refer to the alternative educational plans for this course located at/in [faculty member determines this. Students
should review the plans and gather all required materials before an emergency is declared.
Please remember that if, for any reason, you decide to drop this course, you MUST do so officially through the
Registrar's office. The last day to withdraw from a course this semester is tbd.
Note: This syllabus represents the intended structure of the course for the semester. If
changes are necessary, students will be notified in writing and via all regular class
communication mechanisms. It is the student’s responsibility to attend the class and be aware
of changes in course requirements.
Page 10 of 10