INFO70045
Principles of Information Security
Sheridan
 
  I: Administrative Information   II: Course Details   III: Topical Outline(s)  Printable Version
 

Land Acknowledgement

Sheridan College resides on land that has been, and still is, the traditional territory of several Indigenous nations, including the Anishinaabe, the Haudenosaunee Confederacy, the Wendat, and the Mississaugas of the Credit First Nation. We recognize this territory is covered by the Dish with One Spoon treaty and the Two Row Wampum treaty, which emphasize the importance of joint stewardship, peace, and respectful relationships.

As an institution of higher learning Sheridan embraces the critical role that education must play in facilitating real transformational change. We continue our collective efforts to recognize Canada's colonial history and to take steps to meaningful Truth and Reconciliation.


Section I: Administrative Information
  Total hours: 42.0
Credit Value: 3.0
Credit Value Notes: N/A
Effective: Winter 2021
Prerequisites: N/A
Corequisites: N/A
Equivalents: N/A
Pre/Co/Equiv Notes: N/A

Program(s): Cybersecurity Foundations
Program Coordinator(s): N/A
Course Leader or Contact: N/A
Version: 20210118_00
Status: Approved (APPR)

Section I Notes: This is a course offered through OntarioLearn. Access to the course materials will be through OntarioLearn.com and you will be sent an email with your login details.

 
 
Section II: Course Details

Detailed Description
This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.

Program Context

 
Cybersecurity Foundations Program Coordinator(s): N/A
N/A


Course Critical Performance and Learning Outcomes

  Critical Performance:
N/A
 
Learning Outcomes:

To achieve the critical performance, students will have demonstrated the ability to:

  1. Discuss the definition, key terms, concepts, and professional roles of Information Security.
  2. Identify organizational business needs, security program, threat and attack identification and issues facing software developers in Information Security.
  3. Describe the functions and relationships among laws, regulations, and professional organizations in Information Security with focus on how they apply to ethics in Information Security.
  4. Define the benefits of Risk Management including risk identification, risk control, risk mitigation and risk assessment.
  5. Describe the development, maintenance and enforcement of information security policy, standards, practices, procedures and guidelines and the integration with contingency, disaster recovery and business continuity planning.
  6. Identify the importance of Role of Access Control in information systems with a focus on firewall and VPN technology.
  7. Describe categories, operating models and methods of using intrusion detection, prevention systems, and honeypot technologies.
  8. Describe categories of scanning and analysis tools and various methods of access control.
  9. Describe the history of cryptography, the operating principles, and the behaviour of the dominant methods of attack.
  10. Discuss the relationship between information security and physical security with a focus on key physical security considerations and environmental considerations.
  11. Discuss considerations associated with the transitioning of an information security blueprint to a project plan.
  12. Describe the positioning of Information Security within organizations by addressing the concerns of staffing, enumerating credentials, supporting policies and practices and special requirements.
  13. Describe the need for ongoing maintenance of Information Security plans including recommended security management models, including key factors and procedure reviews.

Evaluation Plan
Students demonstrate their learning in the following ways:

 Evaluation Plan: ONLINE
 Tests (2 x15%)30.0%
 Assignments (2 x 15%)30.0%
 Final Examination*40.0%
Total100.0%

Provincial Context
The course meets the following Ministry of Colleges and Universities requirements:


 

Prior Learning Assessment and Recognition
PLAR Contact (if course is PLAR-eligible) - Office of the Registrar
Students may apply to receive credit by demonstrating achievement of the course learning outcomes through previous relevant work/life experience, service, self-study and training on the job. This course is eligible for challenge through the following method(s):

  • Other
    Notes:  This course is delivered through OntarioLearn and is hosted by Seneca College. Access to this course is through is the OntarioLearn website.

 
 
Section III: Topical Outline
Some details of this outline may change as a result of circumstances such as weather cancellations, College and student activities, and class timetabling.
Instruction Mode: Online
Professor: N/A
Resource(s):
 TypeDescription
RequiredTextbookPrinciples of Information Security, Michael E. Whitman, Herbert J. Mattord, Nelson, 6th, ISBN 9781337102063
RequiredTextbookHands-On Information Security Lab Manual, Michael E. Whitman, Herbert J. Mattord, Nelson, 5th, ISBN 978-1-285-16757-2

Applicable student group(s): Online Students
Course Details:
  • Intro to Information Security

  • The Need for Security

  • Legal, Ethical and Professional Issues in IT Security

  • Risk Management

  • Planning for Security

  • Security Technology: Intrusion Detection and Prevention Systems

  • Cryptography

  • Physical Security

  • Implementing Information Security

  • Security and Personnel

  • Information Security Maintenance  



Sheridan Policies

It is recommended that students read the following policies in relation to course outlines:

  • Academic Integrity
  • Copyright
  • Intellectual Property
  • Respectful Behaviour
  • Accessible Learning
All Sheridan policies can be viewed on the Sheridan policy website.

Appropriate use of generative Artificial Intelligence tools: In alignment with Sheridan's Academic Integrity Policy, students should consult with their professors and/or refer to evaluation instructions regarding the appropriate use, or prohibition, of generative Artificial Intelligence (AI) tools for coursework. Turnitin AI detection software may be used by faculty members to screen assignment submissions or exams for unauthorized use of artificial intelligence.

Course Outline Changes: The information contained in this Course Outline including but not limited to faculty and program information and course description is subject to change without notice. Nothing in this Course Outline should be viewed as a representation, offer and/or warranty. Students are responsible for reading the Important Notice and Disclaimer which applies to Programs and Courses.


[ Printable Version ]

Copyright © Sheridan College. All rights reserved.