I. Course Prefix/Number: CNS 176
Course Name: Security+ Certification
Credits: 3 (3 lecture; 1 lab)
III. Course (Catalog) Description
Course presents balance between security management and technical components of security. Focus is on Security Systems Development Life Cycle (SecSDLC). Topics include structured methodology as supportive framework to guide students through examination of components of information domain of Information Security Network. This course helps prepare the student for appropriate Network or Information Security Certification examinations. Recommend: CNS 105 or consent of instructor, coordinator, or program chair.
IV. Learning Objectives
Upon completion of this course the student will have learned to:
- Describe the components of risk assessment; common types of attacks and malicious code
- Identify common threats to a computing infrastructure and common defenses against threats
- Apply basic security guidelines and the role of security baselines
- Monitor and maintain a security baseline.
- Identify access control methods.
- Plan and implement authentication and access control strategies.
- Explain basic principles and uses of cryptography. the certificate life cycle.
- Learn how cryptography is applied and analyze how a public key infrastructure distributes cryptographic keys
- Learn what certificates are and determine how they are used.
- Describe and modify practical applications of a public key infrastructure (PKI).
- Analyze how features of TCP/IP relate to network security.
- Create and test procedures for detecting intrusion attempts.
- Respond to security incidents.
- Identify common attacks against Web servers, Internet, Domain Name System (DNS) and DHCP applications and explain how to protect against these attacks.
- Learn and test how to secure instant messaging (IM).
- Implement firewalls and identify steps for establishing site security.
- Secure removable media and dispose of equipment
- Maintain and modify documentation, policies, and procedures.
- Assess risks and Establish security education
- Resolve ethical dilemmas.
V. Academic Integrity and Student Conduct
• plagiarism (turning in work not written by you, or lacking proper citation),
• falsification and fabrication (lying or distorting the truth),
• helping others to cheat,
• unauthorized changes on official documents,
• pretending to be someone else or having someone else pretend to be you,
• making or accepting bribes, special favors, or threats, and
• any other behavior that violates academic integrity.
There are serious consequences to violations of the academic integrity policy. Oakton's policies and procedures provide students a fair hearing if a complaint is made against you. If you are found to have violated the policy, the minimum penalty is failure on the assignment and, a disciplinary record will be established and kept on file in the office of the Vice President for Student Affairs for a period of 3 years.
Please review the Code of Academic Conduct and the Code of Student Conduct, both located online at
VI. Sequence of Topics
- Information Security Fundamentals
- Attackers and Their Attacks
- Security Basics
- Security Baselines
- Securing the Network Infrastructure
- Web Security
- Protecting Advanced Communications
- Scrambling Through Cryptography
- Using and Managing Keys
- Operational Security
- Policies and Procedures
- Security Management
- Advanced Security and Beyond
VII. Methods of Instruction
Methods include lectures, class exercises, and discussion. Also included will be “hands-on” lab exercises and projects.
Course may be taught as face-to-face, hybrid or online course.
VIII. Course Practices Required
- Read course materials - textbook and current journals before the class
- Frequent attendance and participation in class lecture and lab
- Complete required assignments, exercises, and examinations
- Complete LAB projects
- To ensure success of the Course and certification all Students should use practice self-test. Below are some Internet sites to help you get certified, please share other websites, with class:
- Industry Certificate Testing Information:
The following sites are the Certificate Providers please contact them directly to schedule to take the certification examination. These test providers have helpful hints and advice for successfully taking the test. Study guides, objectives, requirements for the examination and other helpful hints are available:
IX. Instructional Materials
• Current Security+ textbooks and manuals
• G, 3rd
• Software used for lab is Microsoft Windows XP Professional and Windows 2000 or 2003 Server and Linux
X. Methods of Evaluating Student Progress
Evaluation methods include quizzes, examinations, completion of lab assignments and special exercises.
Final grades are determined through a weighted average of examinations, quizzes, laboratory assignments, homework assignments, class participation, and attendance. After your numerical grade has been calculated, your letter grade will be determined as follows:
|A||90–100% of the total percentage points possible|
|B||80–89% of the total percentage points possible|
|C||70–79% of the total percentage points possible|
|D||60–69% of the total percentage points possible|
|F||Less than 60% of the total percentage points possible|
XI. Other Course Information
- In response to Columbine and the NIU tragedies police agencies in Illinois have developed training for law enforcement and the public school systems. These Nationally accepted law enforcement response plans have been adopted by Oakton's Public Safety Department. Your actions will influence others therefore, Oakton is asking you as a student to:
- stay calm
- secure the immediate area; lock, block, & barricade
- call 911 and:
- report your specific location
- number of people at your location
- assailants; location, number, race, gender, clothing, physical features, type of weapon
- Side Note: There is a phone for emergency purposes placed in each classroom.
If you have a documented learning, psychological, or physical disability you may be entitled to reasonable academic accommodations or services. To request accommodations or services, contact the Access and Disability Resource Center at the Des Plaines or Skokie campus. All students are expected to fulfill essential course requirements. The College will not waive any essential skill or requirement of a course or degree program.
Oakton Community College is committed to maintaining a campus environment emphasizing the dignity and worth of all members of the community, and complies with all federal and state Title IX requirements.
Resources and support for
- pregnancy-related and parenting accommodations; and
- victims of sexual misconduct
Resources and support for LGBTQ+ students can be found at www.oakton.edu/lgbtq.
Electronic video and/or audio recording is not permitted during class unless the student obtains written permission from the instructor. In cases where recordings are allowed, such content is restricted to personal use only. Any distribution of such recordings is strictly prohibited. Personal use is defined as use by an individual student for the purpose of studying or completing course assignments.
For students who have been approved for audio and/or video recording of lectures and other classroom activities as a reasonable accommodation by Oakton’s Access Disabilities Resource Center (ADRC), applicable federal law requires instructors to permit those recordings. Such recordings are also limited to personal use. Any distribution of such recordings is strictly prohibited.
Violation of this policy will result in disciplinary action through the Code of Student Conduct.