IT 0145. Introduction to Cybersecurity: Ethical Hacking

Units: 3
Formerly known as CIS 152
Prerequisite: Completion of IT 120 with grade of "C" or better
Advisory: Completion of CSCI 50 with grade of "C" or better
Hours: 72 (54 lecture, 18 laboratory)
Immerses IT Professionals in hands-on intensive environment providing in-depth knowledge and experience with current essential security systems. Provides understanding of perimeter defenses and leads to scanning and attacking networks; no real networks are harmed. Students learn how intruders escalate privileges and the steps to be taken to secure a system. Also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virtual Creation. Focus includes legal and regulatory requirements, ethical issues, basic methodology and technical tools used for ethical hacking and penetration tests. Students establish a pre-test agreement with the enterprise, discover and exploit vulnerabilities, participate as a member of a pen test team and prepare a penetration test report. (CSU)

IT 0145 - Introduction to Cybersecurity: Ethical Hacking

http://catalog.sierracollege.edu/course-outlines/it-0145/

Catalog Description Formerly known as CIS 152 Prerequisite: Completion of IT 120 with grade of "C" or better Advisory: Completion of CSCI 50 with grade of "C" or better Hours: 72 (54 lecture, 18 laboratory) Description: Immerses IT Professionals in hands-on intensive environment providing in-depth knowledge and experience with current essential security systems. Provides understanding of perimeter defenses and leads to scanning and attacking networks; no real networks are harmed. Students learn how intruders escalate privileges and the steps to be taken to secure a system. Also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virtual Creation. Focus includes legal and regulatory requirements, ethical issues, basic methodology and technical tools used for ethical hacking and penetration tests. Students establish a pre-test agreement with the enterprise, discover and exploit vulnerabilities, participate as a member of a pen test team and prepare a penetration test report. (CSU) Course Student Learning Outcomes CSLO #1: Research, analyze and evaluate information to solve business problems using cybersecurity ethical hacking concepts and software. CSLO #2: Design and produce cybersecurity ethical hacking solutions incorporating current trends, security, and best practices. CSLO #3: Employ cybersecurity ethical hacking concepts and terminology in professional communication. CSLO #4: Demonstrate marketable cybersecurity ethical hacking career skills. Effective Term Fall 2023 Course Type Credit - Degree-applicable Contact Hours 72 Outside of Class Hours 90 Total Student Learning Hours 162 Course Objectives Provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. General Education Information Approved College Associate Degree GE Applicability CSU GE Applicability (Recommended-requires CSU approval) Cal-GETC Applicability (Recommended - Requires External Approval) IGETC Applicability (Recommended-requires CSU/UC approval) Articulation Information CSU Transferable Methods of Evaluation Objective Examinations Example: Based upon course readings and class discussions relating vulnerability findings and exploitation, students would be required to take a quiz relating to chapter content, and to explain issues pertaining to vulnerabilities and exploits. Example: In your own words (no copy/paste allowed) identify vulnerabilities in a system and take advantage of that vulnerability. Instructor will grade based on level of understanding shown in the response. Problem Solving Examinations Example: Students will be provided with a virtualized environment with various operating systems to exploit. Students would have to determine the right tool to use for the system being tested. Students would also have to analyze the output of various security tools utilized during this engagement. Pass/Fail grading. Projects Example: Given a specific scenario, students would be required to prepare a Penetration Testing report. Student performance would be based upon a rubric designed to incorporate both the requirements of a Pentest report, as identified course readings, and the clearness of plan response instructions. Skill Demonstrations Example: Students will be provided lab assignments based on the weekly topic and required to complete the tasks outlined. See the lab example in 14b for sample. Example: Students will attempt to exploit systems and discuss their process. Students will capture images to show the process and submit for grading. Grading will be based on a complete set of images with proper notations as described in the instructions. Pass/Fail grading. Repeatable No Methods of Instruction Laboratory Lecture/Discussion Distance Learning Lab: Instructor will guide students through hands-on lab exercise to test systems for vulnerabilities and exploit those vulnerabilities utilizing tools and techniques discussed in class. (Objectives 11-14) Lecture: Students will read weekly assignments related to exploiting system vulnerabilities. The instructor will lead a review discussion on the topics covered. (Objective 11) Distance Learning Following an online instructor lecture on penetration testing standards and policies, students will be provided with a written scenario, outlining a company's penetration testing standard and policies and will test an assets security to that policy. (Objective 24) Typical Out of Class Assignments Reading Assignments 1. Students read from the course text. For example, students read the textbook chapter on Analyzing Vulnerability Scans and answer end of chapter questions. 2. Students perform vulnerability scans in an isolated lab environment and analyze and exploit systems based on findings Writing, Problem Solving or Performance Example 1: Students will utilize Kali Linux tools to test the security of operating systems and network environments Example 2: Detail the specific differences between a vulnerability scan and a penetration test. Students will also discuss use case between the two scenarios. Other (Term projects, research papers, portfolios, etc.) Required Materials CompTIA PenTest+ Study Guide: Exam PT0-002 Author: David Seidl Publisher: Sybex Publication Date: 2021 Text Edition: 2nd Classic Textbook?: No OER Link: OER: Other materials and-or supplies required of students that contribute to the cost of the course.

Information Technology

http://catalog.sierracollege.edu/departments/infotech/

Information Technology programs prepare students for a wide array of Information Technology (IT) career paths. IT encompasses computer professional careers and positions, from Tech Support to Cyber Security, and from Office Work to Business Analyst. Careers in IT deal with the design, creation, management, maintenance, and business use of the varied components of computer systems, including software, hardware, networks, and the cloud. The field spans a broad range of industries, including technology, healthcare, finance, retail, government and education; and includes jobs that involve business computer applications, databases, technical and customer support services, web authoring/developing, Internet information research, network administration, and cybersecurity. Some courses prepare students for industry certifications such as CompTIA’s, A+, Network+, Security+, or Microsoft’s MSCE. The curriculum also provides valuable computer experience and training for students who are enrolled in other disciplines of the College.

BUS 0145 - Planning, Financing and Operating a Small Business

http://catalog.sierracollege.edu/course-outlines/bus-0145/

Catalog Description Formerly known as BUS B Advisory: Completion of BUS 144 with grade of "C" or better Hours: 54 lecture Description: Practical study of the accounting and financial management methods essential for the efficient operation of small businesses. Provides entrepreneurs with skills to prepare and analyze financial statements, tax planning, ratio analysis and financial projections; and manage cash flow, accounts receivable, accounts payable, inventory management, and break-even analysis. (not transferable) Course Student Learning Outcomes CSLO #1: Critique legal entity choices for small business owners. CSLO #2: Investigate the importance of cash flow management on A/R, A/P and inventory. CSLO #3: Develop budgets and projections for small business owners. Effective Term Fall 2020 Course Type Credit - Degree-applicable Contact Hours 54 Outside of Class Hours 108 Total Student Learning Hours 162 Course Objectives Through written activities, computations, group activities and case studies the student will: 1. Assess the importance of accounting and financial management for the small business owner. 2. Evaluate the pros and cons of different ownership structures. 3. Evaluate the difference between cash flow and net income and manage cash flow. 4. Analyze and evaluate balance sheets, income statements and statements of cash flow using vertical, horizontal, and ratio analysis. 5. Learn how to use ratios in analyzing financials. 6. Establish credit policies and manage and collect accounts receivable. 7. Learn how to do break-even analysis. 8. Develop internal controls to safeguard assets, prevent fraud and theft and encourage operational efficiency. 9. Critique credit terms and management of accounts payable. 10. Develop financial projections. General Education Information Approved College Associate Degree GE Applicability CSU GE Applicability (Recommended-requires CSU approval) Cal-GETC Applicability (Recommended - Requires External Approval) IGETC Applicability (Recommended-requires CSU/UC approval) Articulation Information Not Transferable Methods of Evaluation Essay Examinations Example: Identify the three fraud triangle factors and explain how each contributes to the possibility of fraud. Which factors are best mitigated through internal controls? This essay will be graded by the instructor using a rubric. Objective Examinations Example: Answer multiple choice questions on course topics (business structures, financial statements, inventory management). Questions will be graded using a scantron form. Example: True or False - A Balance Sheet covers a period of time. Problem Solving Examinations Example: Given a set of data, calculate the company’s break-even point in price and quantity of products using the concepts of fixed, variable, and mixed costs. This problem will be graded by the instructor to ensure the accuracy of calculations. Projects Example: Using the given financial statements, calculate the following ratios: acid-test, accounts receivable turnover, inventory, debt, and profit margin. From your results write an evaluation using a minimum of 150 words, analyzing the company’s performance and suggestions for improvement. This project will be graded by the instructor using a rubric to ensure that all points in the evaluation are covered and proper grammar/spelling is used. Skill Demonstrations Example: Create a pro forma cash budget and determine the company’s future cash needs. This demonstration will be graded by the instructor to ensure the correct responses and format. Repeatable No Methods of Instruction Lecture/Discussion Distance Learning Lecture: Topic - Selecting a Form of Business Ownership The presentation of this topic would begin with a lecture that introduces and defines each form of ownership structure. This would include a discussion of advantages and disadvantages of each ownership form. It would also cover how to set up a company utilizing each ownership structure; including filing requirements and costs. Local companies would be used to illustrate the concepts. At the conclusion of the lecture, students would be broken into small groups. They would be asked to select a form of business ownership for two "mini cases" and be prepared to present their ownership selection and reasons for that selection to the class. The homework assignment would be to research a company and identify its form of business ownership. (Objective 2) Topic - Cash Flow Management This topic would be introduced with a lecture that defines cash flow management, its importance and the benefits of a cash budget. The lecture would be followed by a group case study. Each group would be given the company history and current financial statements. The case study would show a company with positive net income, but poor cash flow. The students would be required to identify why this is happening and brainstorm options for this business owner. The homework assignment would be to create a cash budget. (Objective 3) Distance Learning Topic - Selecting a Form of Business Ownership The presentation of this topic would begin with a instructor created materials that introduces and defines each form of ownership structure. This would include information about the advantages and disadvantages of each ownership form. It would also cover how to set up a company utilizing each ownership structure; including filing requirements and costs. Local companies would be used to illustrate the concepts. Students will be asked to select a form of business ownership for two "mini cases" and be prepared to post on the discussion board their ownership selection and reasons for that selection. The homework assignment would be to research a company and identify its form of business ownership. (Objective 2) Topic - Cash Flow Management This topic would be introduced with instructor created materials that defines cash flow management, its importance and the benefits of a cash budget. The instructor will put students into group in the course management website and each group would be given the company history and current financial statements. The case study would show a company with positive net income, but poor cash flow. The students would be required to identify why this is happening and brainstorm options for this business owner. The group would turn in a one page paper outlines their suggestions to the business owner. The homework assignment would be to create a cash budget. (Objective 3) Typical Out of Class Assignments Reading Assignments 1. Read the chapter that covers the different financial statements (income statement, balance sheet, and statement of cash flows) and be prepared to discuss how the small business owner can use these statements to evaluate the financial performance of their business. 2. Evaluate corporate financials and use principles taught in class to discuss the businesses strengths and weaknesses financially. Writing, Problem Solving or Performance 1. Create financial statements for a small business. 2. Develop credit and collection policies. 3. Analyze financials using ratios. Other (Term projects, research papers, portfolios, etc.) Required Materials Managerial Accounting for Small Businesses Author: Kenneth Creech Publisher: North Atlantic Business Press, Inc. Publication Date: 2013 Text Edition: 1st Classic Textbook?: No OER Link: OER: Other materials and-or supplies required of students that contribute to the cost of the course. Calculator