Course Description
This course will focus on how internet and web-based applications have transformed the way businesses, organizations, and people communicate. With this transformation comes new risks, threats, and vulnerabilities for web-based applications and the people who use them. This course presents security strategies to mitigate the risk associated with Web applications and social networking. (3 credits)
Prerequisites
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
- ITE 220: Networking & Data Communications (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Analyze the impact of the Internet and Web applications on the business world.
- Analyze common personal online security threats and risks.
- Compare and contrast Web-based risks.
- Describe the attributes and qualities of the software development life cycle and secure coding practices.
- Analyze the role and importance of audit and compliance to Web application security.
- Analyze the role and importance of quality assurance testing for Web applications.
- Explain the value and importance of vulnerability and security assessments for Web applications.
- Describe popular mobile devices and communications technologies, and their security risks.
- Identify store-and-forward and real-time communications, and the threats against them.
- Describe common areas of the IT industry and the roles each plays in creating secure environments.
Course Activities and Grading
Assignments | Weight |
---|---|
Discussions (Weeks 1-3, 6 & 8) | 6% |
Lab Assignments (Weeks 1-7) | 20% |
Written Assignments (Weeks 1, 2, 4 & 7) | 8% |
Project (Weeks 2-8) | 37% |
Quizzes (Weeks 4-7) | 4% |
Final Exam (Week 8) | 25% |
Total | 100% |
Required Textbooks
Available through Charter Oak State College's Book Bundle
- Harwood, Mike. Internet Security: How to Defend Against Attackers on the Web - Print Bundle for LMS Integrations. 2nd ed. Sudbury, MA: Jones & Bartlett, 2016. ISBN-13: 9781284159660
- Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.
Course Schedule
Week | SLOs | Readings and Exercises | Assignments |
1 | 1,2 | Topics: Business Evolution, the Internet & Security Considerations
|
|
2 | 3 | Topics: Understanding & Managing Risk in Web Applications
|
|
3 | 3 | Topics: Identifying & Classifying Weaknesses in Web Applications
|
|
4 | 4 | Topic: Strategies for Developing Secure Web Applications
|
|
5 | 5 | Topic: Maintaining PCI DSS Compliance for E-Commerce Web Sites
|
|
6 | 6,7 | Topics: Testing, Quality Assurance and Website Vulnerability Security Assessments
|
|
7 | 8,9,10 | Topics: Securing Mobile, Personal and Business Communications
|
|
8 | 1-10 | Topics: Course Review and Final Examination
|
|
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.