MAIN MENU

Computer Information Science

CISS Course Descriptions

Course Descriptions CISS

CISS 300
Introduction to Information Systems Security
1 Unit
Prerequisite: None.
Advisory: Some experience and/or coursework in networking.
Course Transferable to CSU
Hours: 18 hours LEC
This course is intended for beginner users who want to increase their understanding of information security issues and practices. It is intended for end users who use computers at home or in the office. The course covers all of the need-to-know information about staying secure, including up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks. Students will learn how to maintain a secure environment and avoid security attacks through a series of real-life user experiences, hands-on projects, and case projects.
CISS 310
Network Security Fundamentals
3 Units
Prerequisite: None.
Advisory: CISN 300 and 304 with grades of "C" or better
Course Transferable to CSU
Hours: 45 hours LEC; 27 hours LAB
This course is an introduction to the fundamental principles and topics of Information Technology security and Risk Management at the organizational level. It also addresses hardware, software, processes, communications, applications, and policies and procedures with respect to cyber-security. In addition, this course prepares students for the CompTIA Security+ certification exam.
CISS 320
Implementing Network Security and Counter Measures
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Course Transferable to CSU
Hours: 45 hours LEC; 27 hours LAB
This course introduces students to Intrusion Detection. It also covers such essential practices as developing a security policy and then implementing that policy by performing Network Address Translation; setting up packet filtering; and installing proxy servers; firewalls; and virtual private networks. Finally, this course includes many hands-on activities or labs along with realistic case studies.
CISS 330
Implementing Internet Security and Firewalls
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Course Transferable to CSU
Hours: 48 hours LEC; 18 hours LAB
With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. The firewall has emerged as a primary tool used to prevent unauthorized access. Students will learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall Virtual Private Networks (VPNs).
CISS 341
Implementing Windows Operating System Security
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Advisory: CISC 308
Course Transferable to CSU
Hours: 48 hours LEC; 18 hours LAB
As organizations increasingly come to rely on Windows-based networks, it is essential that system administrators have a complete understanding of the security models integral to Windows Server and Workstation. This course will provide in depth explanations of operating system security features as well as step-by-step configuration guides for proper operating system configuration. It also provides the knowledge and skills students will need to know in order to maintain the integrity, authenticity, availability, and privacy of data.
CISS 342
Implementing Linux Operating System Security
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Advisory: CISS 310
Course Transferable to CSU
Hours: 48 hours LEC; 18 hours LAB
The UNIX family of operating systems is prized by developers and other IT professionals for their flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threats. For the many organizations that depend upon UNIX systems, protection against intrusion is an absolute requirement. This course provides the knowledge and skills you need to establish security for the Linux platform. It will present in depth explanations of operating system security features as well as step-by-step configuration guides for proper operating system configuration. This course also will cover the knowledge and skills students will need to maintain the integrity, authenticity, availability, and privacy of data.
CISS 350
Disaster Recovery
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Course Transferable to CSU
Hours: 48 hours LEC; 18 hours LAB
This course teaches students how to identify network vulnerabilities and how to take the appropriate countermeasures to prevent and mitigate failure risks for an organization. Students will gain an understanding of the steps needed for good disaster recovery including, how to prepare a disaster recovery plan, the various risks associated with an enterprise network, the diverse job functions of employees in a Disaster Recovery Plan, and the methods needed to implement a plan once it is complete. In addition, each student will develop a Disaster Recovery Plan with a group for a real or fictitious organization.
CISS 356
Introduction to Information Assurance
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Course Transferable to CSU
Hours: 45 hours LEC; 27 hours LAB
This course introduces the network security specialist to the various methodologies for attacking a network. Students will be introduced to the concepts, principles, and techniques, supplemented by hands-on exercises, for attacking and disabling a network within the context of properly securing a network. The course will emphasize network attack methodologies with the emphasis on student use of network attack techniques and tools and appropriate defenses and countermeasures. Students will receive course content information through a variety of methods: lecture and demonstration of hacking tools will be used in addition to a virtual environment. Students will experience a hands-on practical approach to penetration testing measures and ethical hacking.
CISS 360
Computer Forensics and Investigation
3 Units
Prerequisite: CISS 310 with a grade of "C" or better
Advisory: CISC 308
Course Transferable to CSU
Hours: 45 hours LEC; 27 hours LAB
This course is an introduction to the methods used to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Topics covered include an overview of computer forensics as a profession; the computer investigation process; understanding operating systems boot processes and disk structures; data acquisition and analysis; technical writing; and a review of familiar computer forensics tools.