Course Syllabus

Welcome

to

OSINT and Introductory Security Analysis

(ITSY1371)

Blended Environment

Credit Hours:  3

You will find all your course materials, assignments, and quizzes/exams in Modules. Click Modules in the Course Navigation

This course includes distance learning components which may contain links to Web sites operated and maintained by other public or private entities. While Collin College instructors provide link information to these sites, the College assumes no responsibility for the privacy practices or the content of such Web sites. It is recommended that users consider the individual privacy policy statements of each web site they visit.

Copyright: Materials used in connection with this course may be subject to copyright protection.

                                                            

Instructor:  

Email: 

 

Class Information: (Hybrid)

Class Dates: 

Meeting Times: 

Meeting Location: 

Building: 

Room: 

 

Minimum Technology Requirement:

Minimum Student Skills:

Netiquette Expectations:  expectations for electronic discussions and mail communication

 

Course Information

 Course Number: ITSY 1371

Course Title: OSINT and Introductory Security Analysis

Course Description: A study of open source and subscription threat intelligence. Includes the role of threat intelligence and organizational incident response. Topics include collection methods, management of operations, classification, production and analysis, assessment of threat vulnerability, business impact analysis, incidence response, and identification of various reporting requirements. The use of link diagrams and various types of association matrices will be introduced and emphasized.

Course Credit Hours: 3

Lecture Hours: 2

Lab Hours: 2

Cooperative Work Experience Hours: 0

Prerequisite(s)/Concurrent Enrollment: NA

 

Student Learning Outcomes:

State-mandated Outcomes: Upon successful completion of this course, students will:

1. NA - This course does not exist at the state level – it is to increase the overall security research and analytical capability of entry level workers in the work force as an expressed goal of the advisory board.

Additional Collin Outcomes: Upon successful completion of this course, students will be able to:

1. Identify, collect, and examine different types and sources of threat intelligence information

2. Conduct a threat vulnerability assessment through the identification and application of threat Tactics, Techniques, and Procedures (TTP’s).

3. Conduct a business impact analysis and present findings to organizational leadership as an oral and written report on the results of the assessment.

Secretary’s Commission on the Acquisition of Necessary Skills (SCANS)- SCANS skills are a group of foundational skills and workplace competencies that the Secretary’s Commission on the Acquisition of Necessary Skills established as vitally important for workplace success in the 21st century.  In Collin’s workforce programs, the SCANS skills are developed and reinforced throughout the curriculum to provide students with an opportunity to hone these skills/competencies in the context of their education.  Over the course of an entire degree program, the successful student is expected to demonstrate all of the SCANS skills and competencies as part of their education.  The SCANS Foundation Skills and Workplace Competencies are described at: 

http://www.collin.edu/academics/programs/Workforce_SCANS_Skills_Syllabi_Code_Key.pdf

IMPORTANT NOTE

Withdrawal Policy:  See the current Collin Registration Guide for last day to withdraw (October 16th) .

Collin College Academic Policies:  See the current Collin Student Handbook.

Americans with Disabilities Act Statement: Collin College will adhere to all applicable federal, state and local laws, regulations and guidelines with respect to providing reasonable accommodations as required to afford equal educational opportunity. It is the student’s responsibility to contact the ACCESS office, SCC-D140 or 972.881.5898 (V/TTD: 972.881.5950) to arrange for appropriate accommodations. See the current Collin Student Handbook for additional information.

ATTENDANCE POLICY:

Regular attendance is required to pass this course. Assignments and materials will be given out during the regularly scheduled class times.

The Cyber Security program may require a criminal background check for co-op placement and/or for job placement. If you have any questions or concerns, please contact your associate dean and check with your licensing/certifying entity to determine your status.”

 

Course Resources: 

Google Hacking for Penetration Testers (3rd Edition)
Syngress (an imprint of Elsevier)
Johnny Long, Bill Gardner, and Justin Brown

ISBN:978-0-12-802964-0

Supplies:  Small notebook or electronic means to keep notes

 

Method of Evaluation

Course Evaluation:

 

Assignments

30%

Discussion Questions

20%

 Quizzes

20%

 Final Exam

30%

 

 

          GRADE SCALE

 

90 - 100

A

80 – 90

B

70 – 80

C

60 – 70

D

50 and Below

F

 

Course Summary:

Date Details Due