This course will focus on how internet and web-based applications have transformed the way businesses, organizations, and people communicate. With this transformation comes new risks, threats, and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with Web applications and social networking. (3 credits)
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security
- ITE 220: Networking & Data Communications (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Analyze the impact of the Internet and Web applications on the business world.
- Analyze common personal online security threats and risks.
- Compare and contrast Web-based risks.
- Describe the attributes and qualities of the software development life cycle and secure coding practices.
- Analyze the role and importance of audit and compliance to Web application security.
- Analyze the role and importance of quality assurance testing for Web applications.
- Explain the value and importance of vulnerability and security assessments for Web applications.
- Describe popular mobile devices and communications technologies, and their security risks.
- Identify store-and-forward and real-time communications, and the threats against them.
- Describe common areas of the IT industry and the roles each plays in creating secure environments.
General Education Outcomes (GEOs)
Course Activities and Grading
Discussions (Weeks 1-3, 6 & 8)
Lab Assignments (Weeks 1-7)
Written Assignments (Weeks 1, 2, 4 & 7)
Project (Weeks 2-8)
Quizzes (Weeks 4-7)
Final Exam (Week 8)
Required TextbooksAvailable through https://bookstore.mbsdirect.net/vbm/vb_home.php?FVCUSNO=35478
- Harwood, Mike. Internet Security: How to Defend Against Attackers on the Web - Print Bundle for LMS Integrations. 2nd ed. Sudbury, MA: Jones & Bartlett, 2016. ISBN-13: 9781284159660
Note: This is a Print Bundle which includes the textbook and the Access Code required for this course. Student must purchase these materials “New” from the Charter Oak State College bookstore. Used materials or materials from any other source are not acceptable.
Readings and Exercises
Topics: Business Evolution, the Internet & Security Considerations
Topics: Understanding & Managing Risk in Web Applications
Topics: Identifying & Classifying Weaknesses in Web Applications
Topic: Strategies for Developing Secure Web Applications
Topic: Maintaining PCI DSS Compliance for E-Commerce Web Sites
Topics: Testing, Quality Assurance and Website Vulnerability Security Assessments
Topics: Securing Mobile, Personal and Business Communications
Topics: Course Review and Final Examination
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.