IT 0120. Introduction to Information Systems Security

Units: 3
Formerly known as CIS 147
Prerequisite: Completion of IT 105 with grade of "C" or better
Advisory: Completion of IT 115 with grade of "C" or better
Hours: 72 (54 lecture, 18 laboratory)
Introduction to the fundamental principles and topics of Information Technology Security and Risk Management at the organizational level. Addresses hardware, software, processes, communications, applications, and policies and procedures with respect to organizational Cybersecurity and Risk Management. Preparation for the CompTIA Security+ certification exams. (C-ID ITIS 160) (CSU)

IT 0120 - Introduction to Information Systems Security

http://catalog.sierracollege.edu/course-outlines/it-0120/

Catalog Description Formerly known as CIS 147 Prerequisite: Completion of IT 105 with grade of "C" or better Advisory: Completion of IT 115 with grade of "C" or better Hours: 72 (54 lecture, 18 laboratory) Description: Introduction to the fundamental principles and topics of Information Technology Security and Risk Management at the organizational level. Addresses hardware, software, processes, communications, applications, and policies and procedures with respect to organizational Cybersecurity and Risk Management. Preparation for the CompTIA Security+ certification exams. (C-ID ITIS 160) (CSU) Course Student Learning Outcomes CSLO #1: Research, analyze and evaluate information to solve business problems using appropriate network security technology. CSLO #2: Design and produce data and computer network security incorporating current trends, security, and best practices. CSLO #3: Employ network security concepts and terminology in professional communication. CSLO #4: Demonstrate marketable network security career skills. Effective Term Fall 2023 Course Type Credit - Degree-applicable Contact Hours 72 Outside of Class Hours 90 Total Student Learning Hours 162 Course Objectives Lecture: 1. Describe the fundamental principles of information systems security. 2. Define the concepts of threat, evaluation of assets, information assets, physical, operational, and information security and how they are related. 3. Evaluate the need for the careful design of a secure organizational information infrastructure. 4. Determine both technical and administrative mitigation approaches. 5. Explain the need for a comprehensive security model and its implications for the security manager or Chief Security Officer (CSO). 6. Define basic cryptography, its implementation considerations, and key management. 7. Design and guide the development of an organization's security policy. Laboratory: 1. Perform risk analysis and risk management. 2. Create and maintain a comprehensive security model. 3. Apply security technologies. 4. Determine appropriate strategies to assure confidentiality, integrity, and availability of information. 5. Apply risk management techniques to manage risk, reduce vulnerabilities, threats, and apply appropriate safeguards/controls. General Education Information Approved College Associate Degree GE Applicability CSU GE Applicability (Recommended-requires CSU approval) Cal-GETC Applicability (Recommended - Requires External Approval) IGETC Applicability (Recommended-requires CSU/UC approval) Articulation Information CSU Transferable Methods of Evaluation Objective Examinations Example: Based upon course readings and class discussions relating to encryption, students would be required to take a quiz relating to chapter content, and to explain different encryption methodologies and their resistance to hacking. Example: In your own words (no copy/paste allowed) identify the difference between asymmetric encryption and symmetric encryption using the same key length, highlighting information about strength and performance related to each. Instructor will grade based on level of understanding shown in the response. Problem Solving Examinations Example: Students will be provided with a written scenario, outlining a company’s current password policy and asked to critique, in writing, the policy, identifying key point in the policy that are acceptable or need to be modified. Key points in terms of evaluation include providing through research information that justifies their analysis of the password policy and includes alternatives relative to what should or should not be implemented. A grading rubric will be provided. Projects Example: Given a specific scenario, students would be required to prepare an "incident response plan (IRP)." Student performance would be based upon a rubric designed to incorporate both the requirements of an IRP, as identified course readings, and the clearness of plan response instructions. Skill Demonstrations Example: Students will be provided lab assignments based on the weekly topic and required to complete the tasks outlined. See the lab example in 14b for sample. Example: The PGP software will be installed in a lab exercise and students would encrypt and decript messages showing how the software is utilized to convert plain text into cybertext and how to reverse the process (decrypt). Students will capture images to show the process and submit for grading. Grading will be based on a complete set of images with proper notations as described in the instructions. Pass/Fail Grading. Repeatable No Methods of Instruction Laboratory Lecture/Discussion Distance Learning Lab: Instructor will guide students through hands-on lab exercises to implement the concepts relating to encryption and the utilization of encryption software. The software would be installed in a lab exercise and students would encrypt and decrypt messages showing how the software is utilized to convert plain text into cyphertext and how to reverse the process (decrypt). (Laboratory Objective 3) Lecture: After students complete weekly reading assignments relating to encryption, the instructor will lead a review discussion on the topics covered. As an example, the instructor will lead a discussion of Pretty Good Privacy (PGP) software. (Lecture Objective 6) Distance Learning Following an online lecture on passwords, students will be provided with a written scenario, outlining a company’s current password policy and asked to critic, in writing, the policy, identifying key point in the policy that are acceptable or need to be modified based upon issues that relate to concerns about privacy, confidentiality, accountability, termination, and other typical business concerns relating to information assurance and cyber defense. (Lecture Objective 7) Typical Out of Class Assignments Reading Assignments 1. Students read from the course text. For example students read the textbook chapter on encryption and answer end of chapter questions. 2. Students perform web based research on software and hardware security concepts from sites such as www.cert.org and report back on their findings. Writing, Problem Solving or Performance Example 1: After listening to the podcast (or reading the transcript) of a discussion titled "Train for the Unexpected," available at the CERT website (http://www.cert.org/podcast/show/20100330meyer.html), submit a one page response, identifying key information that will help you in your efforts to develop an incident response plan. Example 2: Detail the specific differences between symmetric cryptographic algorithms and asymmetric cryptography algorithms and explain where each algorithm would be utilized. Other (Term projects, research papers, portfolios, etc.) Required Materials The Official CompTIA Security+ Student Guide (Exam SY0-601) Author: CompTIA Publisher: CompTIA Publication Date: 2020 Text Edition: Classic Textbook?: No OER Link: OER: CompTIA Security+ Study Guide: Exam SY0-601 Author: Mark Chapple Publisher: Sybex Publication Date: 2021 Text Edition: 8th Classic Textbook?: No OER Link: OER: Other materials and-or supplies required of students that contribute to the cost of the course.

Information Technology

http://catalog.sierracollege.edu/departments/infotech/

Information Technology programs prepare students for a wide array of Information Technology (IT) career paths. IT encompasses computer professional careers and positions, from Tech Support to Cyber Security, and from Office Work to Business Analyst. Careers in IT deal with the design, creation, management, maintenance, and business use of the varied components of computer systems, including software, hardware, networks, and the cloud. The field spans a broad range of industries, including technology, healthcare, finance, retail, government and education; and includes jobs that involve business computer applications, databases, technical and customer support services, web authoring/developing, Internet information research, network administration, and cybersecurity. Some courses prepare students for industry certifications such as CompTIA’s, A+, Network+, Security+, or Microsoft’s MSCE. The curriculum also provides valuable computer experience and training for students who are enrolled in other disciplines of the College.

ARHI 0120 - Survey of Western Art II: Renaissance Traditions

http://catalog.sierracollege.edu/course-outlines/arhi-0120/

Catalog Description Formerly known as ART 1B Hours: 54 lecture Description: Survey of developments in western art and visual culture from 1400-1850. Significant artists and monuments of each major period and region discussed, analyzed, and placed within historical context. Special attention given to the evolving status of the artist, the development of major European art institutions, and the functions of art and architecture within society. (combined with ARHI 130, C-ID ARTH 120) (CSU, UC) Course Student Learning Outcomes CSLO #1: Analyze images for hidden meanings and agendas related to religion, economics, social class, gender, race, and ideals of beauty. CSLO #2: Demonstrate visual literacy by analyzing artworks using proper historical terminology and formal elements in both written and verbal form. CSLO #3: Evaluate how the status and role of the artist changes from Early Renaissance period through the mid-nineteenth century. CSLO #4: Identify and differentiate between the major materials and media used to create works of art in Europe from the Renaissance through Romantic periods. CSLO #5: Identify and differentiate between the major styles of art in Europe during the Renaissance, Mannerist, Baroque, Rococo, Neoclassical, and Romantic periods. Effective Term Fall 2016 Course Type Credit - Degree-applicable Contact Hours 54 Outside of Class Hours 108 Total Student Learning Hours 162 Course Objectives Upon completion of this course the student is expected to be able to: 1. Identify, examine, and assess representative paintings, sculptures, and architecture from the Renaissance, Baroque, and Enlightenment periods employing appropriate art historical terminology. 2. Analyze, discuss, and differentiate works of art and architecture in terms of historical context and cultural values. 3. Discuss the function(s) of art and intended audiences during the Renaissance, Baroque, and Enlightenment periods. 4. List and describe notable characteristics of historical styles including Italian Renaissance, Northern Renaissance, Mannerism, Baroque, Rococo, Neoclassicism, and Romanticism. 5. Compare and contrast works of art from the Renaissance, Baroque, and Enlightenment periods and discuss the stylistic similarities and differences of each. 6. Compare and contrast works of art from the Renaissance, Baroque, and Enlightenment periods and discuss how the differences relate to social, political, religious, and economic changes. 7. Identify and differentiate between the major materials and media used to create works of art 8. Discuss contributions made by notable artists from the Renaissance, Baroque, and Enlightenment periods. 9. Explain how the role of the artist and art institutions changes from the Early Renaissance period through the mid-nineteenth century. General Education Information Approved College Associate Degree GE Applicability AA/AS - Fine Arts CSU GE Applicability (Recommended-requires CSU approval) CSUGE - C1 Arts Cal-GETC Applicability (Recommended - Requires External Approval) IGETC Applicability (Recommended-requires CSU/UC approval) IGETC - 3A Arts Articulation Information CSU Transferable UC Transferable Methods of Evaluation Classroom Discussions Example: Class discussions can be used as continual assessments of students' abilities to verbally analyze artworks and use proper terminology. For example, students may be asked to discuss how a work of art on the screen is typical of a specific historical style (such as Rococo) Essay Examinations Example: Essays exams may test students on application of knowledge and comparison of style, content, function, and context of works. Such as, an in class timed essay where the student is given two images to compare in terms of style, content, function, and historical context. Students would be assessed in terms of ability to make connections between works, both in terms of similarities and differences, tying those similarities and differences to media, technique, and historical context. They would also have to demonstrate ability to use required terms and correctly identify style, media, and techniques in the images. Objective Examinations Example: Objective exams may test students on basics of terminology and recognition of major artists and artworks/monuments. Such as, a fill in the blank quiz where students must identify major media and techniques of the 15th century and an image identification (artist, title, and date). Reports Example: Reports in the form of assigned formal papers can be used to address specific themes in the course, such as asking each student to choose one major artist to research and in a paper analyze their contribution to art during their period. The final paper would be assessed for research methods and citing, ability to clearly organize and state information, and application of historical and aesthetic approaches to an artist and their products. Repeatable No Methods of Instruction Lecture/Discussion Distance Learning Lecture: Instructor presents A. Visually oriented lectures, such as PowerPoint presentations, about artworks and their historical contexts. For example, a lecture on 15th century Flemish panel painting, comparing their humanistic approaches to the previously studied Italian Renaissance painting, the impact of media (fresco vs. oil), and the similarities and differences of social, economic, and religious context. Students will build their ability to identify and differentiate works of art (CLSO 5: Identify and differentiate between the major styles of art in Europe during the Renaissance, Mannerist, Baroque, Rococo, Neoclassical, and Romantic periods), identify media (CLSO 4: Identify and differentiate between the major materials and media used to create works of art in Europe from the Renaissance through Romantic periods), and relate art to its historical context (CSLO 1: Analyze images for the values of the specific culture that produced it, and CSLO 3: Evaluate how the status and role of the artist changes from Early Renaissance period through the mid-nineteenth century). Distance Learning The instructor also creates B. Class and small group discussions (online and on ground) such as: Compare and contrast works of art from the Renaissance, Mannerist, Baroque, Rococo, Neoclassical, and Romantic periods and discuss the stylistic similarities and differences of each Analyze a primary document relating to social and cultural context of art making (contracts, artistic biography, historical art criticism) Work together to analyze an unknown image in terms of subject and style as if coming across an image in a museum or gallery setting In these types of activities, students will actively apply their knowledge and skills to new situations, engaging with visual literacy and analysis skills, including CSLO 2 (Demonstrate visual literacy by analyzing artworks using proper historical terminology and formal elements) as well as the before mentioned CSLOs 1, 3, 4, and 5) Typical Out of Class Assignments Reading Assignments 1. Read chapter in your text and select one painting created by an Italian Renaissance artist. In a three-page, typed double-spaced paper, thoroughly describe the painting in terms of style and function and explain the historical context surrounding its creation. 2. Read provided primary document from instructor (such as Renaissance contract between artist and patron). Analyze the document for clues about the relative status of the artist and the patron, as well as what specific aspects of the process were most tightly controlled. Post your response to the class discussion board and respond to at least three other student responses. Writing, Problem Solving or Performance 1. Identify the two works displayed in class providing artist, title, and date. Compare and contrast the works with regard to their original function and cultural context. In a group, discuss what can be learned about the evolution of art in the western tradition in this time from the comparison. 2. Looking at an unknown image (one that has not been studied in class and is not in the text), decide which historical style it most closely resembles. In a discussion post, defend your choice with evidence from the image itself. Other (Term projects, research papers, portfolios, etc.) Choose one work of art from the Renaissance, Baroque, Neoclassical, or Romantic period. Write a five-page research paper about the work which explains the work's original function, its cultural context, and a discussion of any conflicting interpretations that have been offered by art historians. The paper must be typed and in MLA format. Research a woman artist and/or artist of color whose work is not included in the textbook. Choose one of their representative works and in a formal paper, argue how it stylistically fits within one of the major movements studied in class. Required Materials Art History, v.2 Author: Stokstad, Marilyn & Michael Cothren Publisher: Prentice-Hall Publication Date: 2013 Text Edition: 5th Classic Textbook?: OER Link: OER: Art Across Time, v. 2 Author: Adams, Laurie Schneider Publisher: McGraw-Hill Publication Date: 2010 Text Edition: 4th Classic Textbook?: OER Link: OER: Jansen's History of Art: The Western Tradition Author: Davis, Penelope;Hofrichter, Frima; Jacobs, Joseph; Simon, David; Roberts, Ann; Janson Family Tr Publisher: Pearson Publication Date: 2015 Text Edition: 8th Classic Textbook?: OER Link: OER: Other materials and-or supplies required of students that contribute to the cost of the course. Khan Academy Online Text www.khanacademy.org/humanities

ADMJ 0120 - POST Module II Academy Training

http://catalog.sierracollege.edu/course-outlines/admj-0120/

Catalog Description Advisory: Completion of ADMJ 61C, ADMJ 73, and ENGL N with grades of "C" or better Hours: 231 (143 lecture, 88 laboratory) Description: Satisfies training requirements of the Commission on Peace Officer Standards and Training Module II. Covers community relations, criminal laws, search and seizure, evidence, report writing, enforcement techniques, crime scene investigation, property crimes, crimes against persons, investigations, arrest and control, firearms/chemical agents, crimes against the justice system, and cultural diversity/discrimination. Students are required to have successfully completed Commission on Peace Officer Standards and Training Module III training standards and to obtain California Department of Justice certification of no disqualifying criminal history preventing attendance, due on the first day of instruction. Students are required to possess a valid driver's license and vehicle insurance during the course. Students are also required to have passed the POST Entry Level Law Enforcement Test Battery (PELLETB) with a minimum t-score of 42 within one year prior to the first day of class. Safety and materials fees required. May be repeated for credit to meet legally mandated education/training requirements. (not transferable) Course Student Learning Outcomes CSLO #1: Demonstrate the basic skills necessary to perform the duties of a Level II Reserve Police Officer. CSLO #2: Explain the law and its rules for the collection, identification, and preservation of physical evidence. CSLO #3: Analyze and critique the legal principles governing the use of force. Effective Term Fall 2017 Course Type Credit - Degree-applicable Contact Hours 231 Outside of Class Hours 286 Total Student Learning Hours 517 Course Objectives Lecture Objectives: I. From outline II, LD 3 – Principled Policing in the Community A. Identify the components that compromise communities B. Discuss opportunities where peace officers educate and learn from community members C. Identify resources which provide opportunities to educate and learn from the community D. Recognize a peace officer's role in influencing community attitudes E. Discuss government expectations of law enforcement and peace officers F. Discuss the relationship of ethics to the badge of office G. Identify the essential partnering skills H. Define communication I. Recognize the components of a message in communications with others J. Recognize the potential effects of negative nonverbal signals K. Give examples of effective communication techniques for active listening, establishing effective lines of communication, and overcoming barriers to communication L. Discuss the communication techniques that can be used for obtaining voluntary compliance M. Define facilitation N. Discuss the components of the facilitation process O. Apply facilitation techniques reflecting professional behavior P. Give examples of obstacles that officers may encounter when developing community partnerships Q. Define community mobilization R. Discuss the elements of the community mobilization process S. Educating the public T. Taking responsibility for public safety and quality of life U. Sustaining effort V. Discuss community mobilization methods W. Discuss the benefits of maintaining a positive relationship with the news media X. Discuss the components of a community inventory Y. Define homeland security Z. Identify the benefits of integrating community mobilization and homeland security AA. Define the term "problem" BB. Identify the elements of the crime triangle CC. Discuss the Broken Windows Theory DD. Define problem solving EE. Distinguish between problem oriented policing (POP) and community policing (CP) FF. Define crime prevention GG. Give examples of crime risk factors HH. Identify methods for recognizing crime problems II. Define Crime Prevention Through Environmental Design (CPTED) JJ. Identify the principles of Crime Prevention Through Environmental Design (CPTED) KK. Discuss crime prevention programs within the community LL. Recognize how Principled Policing contributes to legitimacy and benefits the Officer, Agency and Community MM. Recognize how historical and current events affect the perspectives of Law Enforcement and the Community NN. Recognize the existence of implicit bias and how it can influence decision making and procedural justice II. From outline III, LD 6 – Property Crimes A. Recognize the crime elements required to arrest for Theft, Vehicle theft, Defrauding an innkeeper, Burglary, Possession of burglary tools, Possession of or receiving personal property with altered serial numbers or identification marks, Receiving stolen property, and Forgery B. Recognize the crime classification as a misdemeanor or felony C. Describe appropriate peace officer actions when taking a report of burglary or other similar property crimes D. Describe information that should be obtained when interviewing the victim(s) of or witness(es) to a burglary E. Recognize the crime elements required to arrest for Arson, Unlawfully causing a fire, and Possession of a flammable or combustible material F. Recognize the crime classification as a misdemeanor or felony. G. Recognize the crime elements required to arrest for Unauthorized entry of a dwelling and Trespass H. Recognize the crime classification as a misdemeanor or felony I. Recognize the crime elements required to arrest for vandalism J. Recognize what constitutes lawful conduct in a landlord/tenant dispute K. Recognize what constitutes a lawful repossession L. Recognize the crime classification as a misdemeanor or felony III. From outline IV, LD 7 – Crimes Against Persons/Death Investigation A. Recognize the crime elements required to arrest for Kidnapping, False imprisonment, Child abduction without custodial right, and Child abduction with custodial right B. Recognize the crime classification as a misdemeanor or felony C. Recognize the crime elements required to arrest for Robbery and Carjacking D. Recognize the crime classification as a felony E. Recognize the crime elements required to arrest for murder F. Recognize the crime elements and classification for manslaughter crimes G. Identify information that should be obtained and documented when conducting an investigation involving the death of a child H. Identify indicators that a child's death may be due to Sudden Infant Death Syndrome (SIDS) I. Identify appropriate actions for responding officers interacting with parents or care givers involved in a SIDS incident IV. From outline V, LD 8 – General Criminal Statutes A. Recognize the crime elements required to arrest for Lewd conduct, Invasion of privacy, Prostitution, Loitering about a public toilet, and Public intoxication B. Recognize the crime classification as a misdemeanor or felony C. Recognize the crime elements required to arrest for Disturbing the peace, Obstruction of a public way, and Prowling and peeping D. Recognize the crime classification as a felony V. From outline VI, LD 15 – Laws of Arrest A. Differentiate between a detention and a consensual encounter B. Recognize appropriate peace officer actions during a detention C. Recognize conditions where the use of force or physical restraint is appropriate during a detention D. Recognize when there is probable cause to arrest E. Identify elements of a lawful arrest F. Differentiate between arrest and detention G. Identify the purpose of the Miranda warning H. Recognize when Miranda warnings must be given I. Identify the proper administration of Miranda warnings J. Recognize the impact of invoking either the right to remain silent or the right to counsel K. Recognize the types of Miranda waivers L. Recognize the exception to the Miranda rule M. Differentiate between an interview and interrogation N. Identify the purpose of an interrogation O. Differentiate between an admission and confession P. Identify the conditions in which a confession or admission may be admissible in court VI. From outline VII, LD 16 – Search and Seizure A. Recognize how the exclusionary rule applies to a peace officer's collection of evidence B. Recognize how probable cause serves as a basis for obtaining a search warrant C. Recognize the necessary conditions for securing an area pending the issuance of a search warrant D. Identify the time limitations for serving a search warrant E. Recognize the elements for compliance with the knock and notice requirements when serving a search warrant F. Recognize the application of the Nexus Rule while conducting an authorized search G. Recognize why a plain view seizure does not constitute a search H. Recognize the legal requirements for seizure of items in plain view VII. From outline VIII, LD 17 – Presentation of Evidence A. Recognize the requirements and exceptions for admitting hearsay evidence B. Identify a peace officer's responsibilities regarding pretrial preparation C. Identify aspects of a case that peace officers should review prior to giving testimony D. Identify factors related to a peace officer's personal appearance that can influence how an officer's testimony is received by the court E. Identify appropriate peace officer responses while testifying as a witness F. Identify appropriate responses when a peace officer is unsure of or does not know the answer to a question asked by an attorney G. Identify appropriate responses when asked to give an opinion while testifying H. Recognize the importance of being a truthful peace officer while testifying in court VIII. From outline IX, LD 18 – Investigative Report Writing A. Explain the legal basis for requiring investigative reports B. Discuss the importance of taking notes in preparation for writing reports C. Apply appropriate actions for taking notes during a field interview D. Distinguish between Opinion, Fact, and Conclusion E. Summarize the primary questions that must be answered by an investigative report F. Identify the fundamental content elements in investigative reports G. Apply guidelines for recommended grammar used in investigative reports H. Organize information within a paragraph for clarity and proper emphasis I. Select language that will clearly convey information to the reader of the investigative report J. Distinguish between commonly used words that sound alike but have different meanings K. Proofread for content and mechanical errors IX. From outline X, LD 20 – Use of Force A. Define the term "force option" B. Identify that the objective of using force is to overcome resistance to gain control of an individual and the situation C. Recognize force options and the amount of force a peace officer may used based on the subject's resistance D. Explain the importance of training and ongoing practice when responding to potentially dangerous situations that may require the use of force E. Discuss the importance of effective communication when using force F. Identify the legal standard for the use of deadly force G. Identify the factors required to establish sufficiency of fear for the use of deadly force H. Recognize facts an officer should consider when determining whether or not to use deadly force I. Discuss the role of agency policies regarding the use of deadly force J. Recognize the law regarding justifiable homicide by a public officer and the circumstances under which the homicide is considered justifiable K. Describe why complete documentation of the use of force is critical to the peace officer and the peace officer's agency L. Discuss factors that can affect a peace officer's response when threatened with danger M. Give examples of acceptable techniques for managing anger N. Describe the benefits of ongoing physical and mental training for peace officers involving the use of force O. Explain the legal and administrative consequences associated with the use of unreasonable force P. Explain an agency's potential liability associated with the use of unreasonable force Q. Explain the consequences of an officer's failure to intervene when unreasonable force is used by another peace officer R. Discuss immediate and delayed intervention techniques S. Discuss factors that may inhibit a peace officer from intervening in a situation where a fellow officer may be applying unreasonable force X. From outline XI, LD 21 – Patrol Techniques A. Discuss patrol strategies officers may employ to provide protection and service within their assigned areas of patrol B. Discuss considerations for selecting a patrol strategy C. Select appropriate actions for peace officers who are conducting security checks D. Distinguish between the roles and responsibilities of contact and cover officers E. Select appropriate actions officers should take to maintain their own safety and the safety of others while on patrol F. Describe patrol officer responsibilities when preparing for each patrol assignment G. Discuss tactical considerations and guidelines for patrolling effectively H. Discuss information an officer should include when generating a crime broadcast I. Select appropriate actions when encountering a plainclothes/undercover officer while on patrol J. Discuss safe and effective tactics for initiating a foot pursuit of a fleeing subject XI. From outline XII, LD 22 – Vehicle Pullovers A. Describe the three basic categories of vehicle pullovers B. Describe the inherent risks to officer safety that are associated with conducting a vehicle pullover C. Explain appropriate safety and tactical considerations when conducting vehicle pullovers involving Vans, campers, motor homes, Motorcycles, Buses, and semi-trucks XII. From outline XIII, LD 23 – Crimes in Progress A. Explain the importance of wearing soft personal body armor while on patrol B. Distinguish between officer safety and officer survival C. Discuss the elements of a tactical approach to a crime in progress D. Explain the primary purposes for establishing crime scene perimeters E. Describe response to an officer-down call F. Identify proper procedures for contacting Suspicious Persons G. Discuss factors an officer should consider before becoming involved in any law enforcement action while off-duty XIII. From outline XIV, LD 30 – Preliminary Investigation A. Perform the steps of a preliminary criminal investigation B. Demonstrate actions peace officers may employ to preserve possible physical evidence at a crime scene C. Identify criteria for allowing crime scene photographs to be admitted as evidence by the court D. Demonstrate appropriate precautions that should be taken prior to collection and removal of physical evidence from a crime scene E. Identify the purpose of collecting control/known samples F. Identify the primary reason for establishing a chain of custody record G. Prepare the information that should be noted on a chain of custody record H. Identify the three forms of fingerprint impressions that may be found at a crime scene I. Apply the basic steps for developing latent fingerprints J. Identify general guidelines for collecting and processing physical evidence that may be located at a crime scene XIV. From outline XV, LD 33 – Arrest Methods/Defensive Tactics A. Describe parts of an officer's body that are most vulnerable to serious injury B. Describe parts of an officer's body that may be used as personal weapons for self defense or to overcome resistance by a subject C. Explain the purpose of using restraint devices on a subject D. Describe factors involved in retaining a peace officer's firearm E. Discuss a peace officer's tactical considerations when confronted by an armed subject F. Discuss tactical considerations when disarming a subject G. Discuss a peace officer's justification to retain their firearm or disarm a subject H. Describe common transporting procedures that maximize officer safety and prevent prisoner escape I. Describe the safe and secure positioning of a prisoner in an officer's vehicle XV. From outline XVI, LD 35 – Firearms/Chemical Agents A. State the four fundamental rules of firearms safety B. Explain basic safety guidelines to be followed at a firing range C. Describe the safety precautions for proper storage of firearms D. Describe the basic information about shotguns E. State the guidelines for the safe handling of ammunition F. Describe the primary components of firearm cartridges G. Explain the chain of events that takes place when a projectile is discharged from a cartridge H. Describe the primary components of a shotgun shell I. Define shot pattern as it relates to shotgun shells J. Explain the correlation to the distance traveled by the shot and the size of the shot pattern K. Describe the three ways shot placement can stop a threat L. Describe the components that may prevent problems that should be examined during a routine safety inspection M. Describe the materials, equipment and environment needed to properly clean firearms N. Describe the types of malfunctions and demonstrate the clearing methods O. Describe limitations officers may encounter when shooting under low light/nighttime conditions P. Describe conditions an officer may face when in a combat situation Q. Describe possible physiological and psychological responses an officer may experience under the stress of a combat situation R. Explain steps officers can take to prepare themselves for the extreme stress of combat S. State the statutory requirements for the possession and use of chemical agents T. Describe four methods used to deploy chemical agents U. Describe environmental and physical conditions that can impact the effectiveness of a chemical agent V. State the guidelines for safely carrying, drawing and deploying hand-held canisters of chemical agents W. Discuss the physiological and psychological effects of each of the chemical agents used by peace officers X. Demonstrate proper procedures peace officers should follow when using gas masks XVI. From outline XVII, LD 39 – Crimes Against the Justice System A. Recognize the crime elements required to arrest for Intimidating witnesses or victims, Threats of retaliation, and Violating a court order B. Recognize the crime classification as a misdemeanor or felony C. Recognize the crime elements required to arrest for resisting, delaying or obstructing a peace officer threatening or resisting an executive officer, and threatening a public officer D. Recognize the crime classification as a misdemeanor or felony E. Recognize the crime elements required to arrest for falsely reporting an emergency F. Recognize the crime classification as a misdemeanor or felony G. Recognize the crime elements, required to arrest for unlawful assembly and refusal to disperse H. Recognize the crime classification as a misdemeanor or felony XVII. From outline XVIII, LD 42 – Cultural Diversity/Discrimination A. Define Culture and Cultural Diversity B. Describe personal, professional and organizational benefits of valuing diversity within the community and law enforcement organizations C. Explain the historical and current cultural composition of California D. Define the term racial profiling E. Discuss the legal considerations peace officers should take into account related to racial profiling F. Discuss the impact of racial profiling on the individual citizens, community, officer, and criminal justice system G. Discuss landmark events in the evolution of civil and human rights H. State key indices peace officers should recognize and respect that make up evolving culture among a community I. Discuss the obligations of peace officers in preventing, reporting, and responding to discriminatory or biased practices by fellow officers J. Explain strategies for effective communication within a diverse community K. Describe positive officer behaviors during contacts with members of a cross-cultural community L. State the legal definition of a hate crime based on the Penal Code M. Classify the crime and the elements required to arrest for desecrating religious symbols, interfering with religious freedom, terrorizing another, and interfering with an individual's civil rights N. Explain the legal rights and remedies available to victims of hate crimes based on federal law and civil code O. Describe the impact of hate crimes on victims, the victims' families, and the community P. Discuss the indicators of hate crimes Q. Explain considerations when investigating and documenting incidents involving possible hate crimes R. State the legal definition of sexual harassment S. Discuss the federal and state laws dealing with sexual harassment T. Explain the legal remedies available to a victim of sexual harassment U. Describe behaviors that constitute sexual harassment V. Explain the mandated sexual harassment complaint process guidelines W. State the protections that exist to prevent retaliation against anyone submitting a sexual harassment complaint X. Describe the methods for responding to sexually offensive or unwanted behavior Lab Learning and Testing Objectives: I. From outline XI, LD 21 - Patrol Techniques A. Demonstrate proper procedures for transmitting and receiving a radio communication B. Demonstrate safe and effective tactics for approaching and detaining a pedestrian subject II. From outline XII, LD 22 – Vehicle Pullovers A. Demonstrate appropriate actions officers can take to maintain their own safety and the safety of others while conducting a vehicle pullover B. Demonstrate safety techniques when initiating a vehicle pullover C. Demonstrate appropriate actions for the safe and tactical placement of the patrol unit D. Apply appropriate procedures for exiting the patrol unit E. Demonstrate appropriate safety precautions patrol officers should take when approaching a target vehicle on foot F. Demonstrate appropriate positioning for patrol officers when making face to face contact with the driver of a target vehicle G. Demonstrate the process for conducting a vehicle stop driver contact H. Demonstrate appropriate procedures and communication techniques for directing the driver and occupants out of a target vehicle I. Apply appropriate procedures for checking the validity and authenticity of a driver’s license or other form of personal identification J. Demonstrate officer safety precautions that should be taken during any high-risk vehicle pullover K. Discuss appropriate actions for cover officers who are called to assist the primary officer during a high-risk vehicle pullover L. Demonstrate tactics for conducting a safe and effective high-risk vehicle pullover M. Distinguish between the advantages and disadvantages of a driver side approach, a passenger side approach and a non-approach to a target vehicle III. From outline XIII, LD 23 – Crimes in Progress A. Demonstrate appropriate actions when conducting a search for suspects B. Demonstrate effective officer actions for the safe and tactical response to crimes in progress C. Demonstrate effective officer actions for the safe and tactical response D. Demonstrate Rapid deployment to a deadly encounter (Active shooter) E. Demonstrate proper reaction to Officer ambush/sniper attacks IV. From outline XV, LD 33 – Arrest Methods/Defensive Tactics A. Demonstrate principles of defensive tactics B. Demonstrate an approach to safely and effectively conduct a person search C. Demonstrate cover officer responsibilities during a search of a subject D. Demonstrate the correct positioning of handcuffs on a subject E. Demonstrate the basic techniques for peace officers to safely maintain control of their firearm in a physical conflict F. Demonstrate the appropriate areas on a subject's body that if struck with an impact weapon can be effective in gaining compliance G. Demonstrate the basic techniques for peace officers to safely maintain control of a subject during a search or arrest situation V. From outline XVI, LD 35 – Firearms/Chemical Agents A. Apply routine procedures for cleaning firearms B. Apply the proper steps for safely drawing, firing, and holstering C. Demonstrate the skills to accurately shoot a firearm in daylight and low-light conditions. D. Practice firearms skills at various distances E. Demonstrate proficiency by passing the Firearms Qualification Course F. Apply decontamination procedures that should be followed after a chemical agent has been used G. Demonstrate ability to function when exposed to chemical agents General Education Information Approved College Associate Degree GE Applicability CSU GE Applicability (Recommended-requires CSU approval) Cal-GETC Applicability (Recommended - Requires External Approval) IGETC Applicability (Recommended-requires CSU/UC approval) Articulation Information Methods of Evaluation Objective Examinations Example: Students must pass eight timed POST-constructed multiple-choice exams and a Final exam with varying minimum passing scores established by the State. Per POST guidelines, students who fail any test will receive remedial instruction and only one re-test attempt per test. Skill Demonstrations Example: Per POST guidelines, students will safely and effectively perform hands-on manipulative skills in the following areas: Firearms, Arrest & Control. Students will be personally observed by certified Instructors during the testing performance of skills. Repeatable No Methods of Instruction Laboratory Lecture/Discussion Distance Learning Lab: Instructor will explain and demonstrate various techniques for effective marksmanship in low-light conditions, followed by students practicing shooting while holding a flashlight. Lecture: Using PPT slides and video, the Instructor will lead a class discussion covering the legal and ethical considerations related to use of force. Students are expected to participate in the discussion and demonstrate knowledge of the various aspects of the use of force. Distance Learning Instructor will present lecture and videos related to Police-Community Relations; students will participate in Discussion Board related to the impact of officer actions on community attitudes. Typical Out of Class Assignments Reading Assignments 1. Read a sample Use-of-Force Policy in preparation for a class discussion on how Law Enforcement Departments govern officers' use of force. 2. Read a current event article related to Police-Community relations. Writing, Problem Solving or Performance 1. Write a practice report related to a hypothetical use-of-force situation. 2. Given a hypothetical barrier to effective Police-Community relations, students will work in small groups to develop a plan for opening lines of communication and re-establishing a trusting relationship with members of the Community. Other (Term projects, research papers, portfolios, etc.) Required Materials Learning Domain Workbooks Author: POST Publisher: State of CA Publication Date: 2020 Text Edition: Classic Textbook?: No OER Link: OER: Other materials and-or supplies required of students that contribute to the cost of the course.

Administration of Justice

http://catalog.sierracollege.edu/departments/administration-justice/

...Education Code Section 66746. It is highly recommended...III Academy Training ADMJ 0120 POST Module II...

Humanities

http://catalog.sierracollege.edu/departments/humanities/

...its ideas (philosophy), through its commitment to its...the Middle Ages ARHI 0120 Survey of Western...