NEW MEXICO JUNIOR COLLEGE

MISSION STATEMENT

Cyber Security for the Energy Industry

SYLLABUS

  1. GENERAL COURSE INFORMATION
  2. A. Course Title: Cyber Security for the Energy Industry
    B. Course Number: ENGT 213 - 10690
    C. Semester: Spring 2017
    D. Days/Time: Online
    E. Credit Hours: 3
    F. Instructor: Abitz, Michael
    G. Office: none
    H. Email Address: mabitz@nmjc.edu
    I. Office Phone: none
    J. Office Hours: 9 AM to 9 PM CDT/CST (Call me any day via cell phone number posted on your Home Page)
    K. Time Zone: Mountain Time
    L. Prerequisite(s):
    M. Corequisite(s):
    N. Class Location: Virtual
  3. COURSE DESCRIPTION

    3 Credit Hours This course introduces students to protecting their computers and technology devices from cyber-attacks. Topics include analysis of cyber security, personal security, Internet security, mobile security, and risks to Internet and computer privacy.

  4. COURSE RATIONALE / TRANSFERABILITY

    It is important to check with the institution to which you are planning to transfer to determine transferability. All students are encouraged to keep the course syllabus, as it will help determine the transferability of this course credit to another institution.

  5. REQUIRED / SUGGESTED COURSE MATERIALS

    Required:

    Security Awareness: Applying Practical Security in Your World (5th Ed)
    Mark Ciampa, Ph.D.
    ISBN: 978-1-3055-0037-2

    Suggested:
    None.

    You can buy your books online at the NMJC Bookstore.

  6. GRADING POLICY

    Students attending New Mexico Junior College will be evaluated according to the following grading scale:

    						90 - 100%	=	A
    						80 -  89%	=	B
    						70 -  79%	=	C
    						60 -  69%	=	D
    					 	 0 -  59%	=	F
    

    Retrieving Grades from T-BirdWeb Portal
    Go to the New Mexico Junior College T-BirdWeb Portal login page. Please enter your User Identification Number (ID), which is your Banner ID, and your Personal Identification Number (PIN). When finished, click Login.

    Tips for Success in Online Courses:
    1. Log in to class regularly.
    2. Pay attention.
    3. Take notes.
    4. Keep up with readings and assignments.
    5. Ask questions when you do not understand something.
    6. Utilize your professor’s office hours and e-mail.
    7. Read the text.
    8. Adhere to the deadlines posted in the course outline.

  7. INSTITUTIONAL STUDENT LEARNING OUTCOMES

    New Mexico Junior College’s institutional student learning outcomes represent the knowledge and abilities developed by students attending New Mexico Junior College. Upon completion students should achieve the following learning outcomes along with specific curriculum outcomes for respective areas of study:

  8. DEPARTMENTAL STUDENT LEARNING OUTCOMES

    This course will provide students with the basic principles of security awareness to protect their personal information and online devices.

  9. SPECIFIC COURSE STUDENT LEARNING OUTCOMES

    By the end of the course students should be able to:

    o Explain Cyber Security
    o Analyze Personal Security
    o Identity Threats to Computer Security
    o Apply Internet Security Procedures
    o Examine Mobile Security
    o Identify Risks to Internet Privacy

  10. REQUIRED TECHNICAL COMPETENCIES AND EQUIPMENT

    Student Requirements
    If you have not already received login information for Canvas/T-BirdWeb Portal/E-mail, you will need to contact the Enrollment Management office at (575) 492-2546.

    Check first-time login page for instructions at www.nmjc.edu/distancelearning/coursescourseschedules/canvasinstructions.aspx.

    Canvas Assistance

    You must have access, on a regular basis, to a computer that supports the Canvas minimum specifications and has an active connection to the Internet. See the minimum computer specification requirements at www.nmjc.edu/distancelearning/coursescourseschedules/Canvasinstructions.aspx.

  11. ADDITIONAL INFORMATION

    Response Time Frames

    Grading: one day of posting assignment
    Email: If you send me an email at address on your Home Page my response will usually be within an hour.
    Instructor login: I log into Canvas several times a day from computer or iPhone.

    If you need help contact me by:

    1. Canvas Mail
    2. My personal email address on your Home Page
    3. Text my phone number
    4. Call between 9AM and 9PM (CST/CDT) any day of the week including holidays

  12. GENERAL/MISCELLANEOUS

    Students will be held responsible for the information on these pages.

    Academic Honesty
    Each student is expected to maintain the highest standards of honesty and integrity in online academic and professional matters. The College reserves the right to take disciplinary action, up to and including dismissal, against any student who is found guilty of academic dishonesty or otherwise fails to meet these standards. Academic dishonesty includes, but is not limited to, dishonesty in quizzes, tests, or assignments; claiming credit for work not done or done by others; and nondisclosure or misrepresentation in filling out applications or other College records. Cheating or gaining illegal information for any type of graded work is considered dishonest and will be dealt with accordingly.

    Americans with Disabilities Act (ADA) Information
    Any student requiring special accommodations should contact the Special Needs Student Services Coordinator at (575) 492-2576 or by e-mail at krueda@nmjc.edu.

    Attendance Policy and Participation Expectations
    It is expected that you regularly log into class at least three times weekly and check your Canvas mail to ensure you have not missed any changes/updates. Students are expected to complete discussions/quizzes/tests/ assignments before deadlines expire.

    Canvas Help
    If you experience difficulty with Canvas you may reach the Canvas Helpdesk at canvashelpdesk@nmjc.edu, or by calling the 24 hour helpdesk phone at (575) 399-2199.

    Netiquette
    The professor is responsible for monitoring and evaluating student conduct and student behavior within the Canvas course. By registering for this class, the student is assumed to have entered into an agreement with New Mexico Junior College and the professor to log into the class regularly and to behave in an appropriate manner at all times. Disruptive behavior may result in the student being removed from the class and dropped for the semester. For comprehensive information on the common rules of netiquette and other online issues, please review the NMJC Online Student Handbook.

    Online Learning Environment
    By participating in an online class, you undertake responsibility for your own progress and time management.

    Plagiarism
    Offering the work of another as one’s own, without proper acknowledgment, is plagiarism; therefore, any student who fails to give credit for quotations or essentially identical expression of material taken from books, encyclopedias, magazines and other reference works, or from the themes, reports, or other writings of a fellow student, is guilty of plagiarism. Plagiarism violates the academic honesty policy and is considered cheating.

    Tutoring Assistance
    Free tutoring services are available to all NMJC students through Brainfuse and the Academic Success Center located in Mansur Hall room 123 and 124.

    Withdrawal Policy
    The instructor has the right to drop any student who has failed to log on to Canvas for two weeks or more, but it is not guaranteed that the instructor will drop you. If the student chooses to stop attending a class, he/she should withdraw from the class by accessing your student account in the T-Bird Web Portal at www.nmjc.edu, or submitting the required paperwork to the Registrar’s Office by 5:00 p.m. on Thursday, April 20, 2017. Failure to withdraw yourself from a course by this date may result in your receiving an “F” in the course. All students are encouraged to discuss their class status with the professor prior to withdrawing from the class.

  13. ACADEMIC CALENDAR
  14. FINALS SCHEDULE
  15. COURSE OUTLINE

     

    WEEK 1 Introduction to Security

     

    Topics covered in Introduction to Security:

     

    o   Challenges of Securing Information

    o   What is Information Security?            

    o   Who are the Attackers?

    o   Building a Comprehensive Security Strategy

    o   Chapter Summary

    o   Key Terms

    o   Review Questions

    o   Hands-On Projects

    o   Case Projects

    o   References

     

    Review Introduction to Security.ppt

    VIDEO: Intro to Computer Security

    Read Chapter 1

     

    Learn More About:

    Lawful Interception Methods

    Cyber Threat Source Descriptions

    Perimeter Security

     

    Additional Resources:

    Cyber Crime News

    FBI Cyber Crime Site

    Data Breach Investigations Report

     

    Week 1 Discussion

    Week 1 Exam

     

    WEEK 2 Personal Security

     

    Topics covered in Personal Security:

     

    o   Personal Security Attacks

    o   Personal Security Defenses

    o   Chapter Summary

    o   Key Terms

    o   Review Questions

    o   Hands-On Projects

    o   Case Projects

    o   References

     

    Review Personal Security.ppt

    VIDEO: Do You Really Need Antivirus Software?

    Read Chapter 2

     

    Learn More About:

    450,000 passwords hacked and posted online

    Phishing & Anti-phishing

     

    Additional Resources:

    Security Tips from Department of Homeland Security

    Computer Security info from Federal Trade Commission

    Identity Theft info from Department of Justice

     

    Week 2 Discussions

    Week 2 Exam

     

    WEEK 3 Computer Security

     

    Topics covered in Computer Security:

     

    o   Attacks Using Malware

    o   Computer Defenses

    o   Chapter Summary

    o   Key Terms

    o   Review Questions

    o   Hands-On Projects

    o   Case Projects

    o   References

     

    Review Computer Security.ppt

    Read Chapter 3

     

    Learn More About:

    Biological & Computer Viruses

    Convergence of Biological & Computer Viruses

    Anti-root-kits

    Know your Enemy: Tracking Botnets

     

    Additional Resources:

    Five Portable Antivirus and Antimalware Tools to Carry With You at All Times:

    Botnets

    America's 10 Most Wanted Botnets

    Online Backup Reviews

     

    Week 3 Discussions

    Week 3 Exam

     

    WEEK 4 Internet Security

     

    Topics covered in Internet Security:

     

    o   How the Internet Works

    o   Internet Security Risks

    o   Internet Defenses

    o   Chapter Summary

    o   Key Terms

    o   Review Questions

    o   Hands-On Projects

    o   Case Projects

    o   References

     

    Review Internet Security.ppt

    Read Chapter 4

     

    Learn More About:

    Internet Protocols

    JavaScript Security

    Blocking Unwanted Cookies

     

    Additional Resources:

    JaveScript Resources

    Protective View Settings

    Spy Ware Warrior

    Manage Warnings About Unsafe Sites

     

    Week 4 Discussions

    Week 4 Exam

     

    WEEK 5 Mobile Security

     

    Topics Covered in Mobile Security:

     

    o   Mobile Attacks

    o   Mobile Defenses

    o   Chapter Summary

    o   Key Terms

    o   Review Questions

    o   Hands-On Projects

    o   Case Projects

    o   References

     

    Review Mobile Security.ppt

    Read Chapter 5

     

    Learn More About:

    The Evil Twin Attack

    Bluetooth Security

    Mobile Malware

     

    Additional Resources:

    10 Most Connected Cities in the World

    How Wi-Fi Works

    The Modern Face of Mobile Malware

    Smartphone Security Tips

    Bluetooth Wireless Technology

     

    Week 5 Discussions

    Week 5 Exam

     

    WEEK 6 Privacy

     

    Topics Covered in Privacy:

     

    o   Privacy Primer

    o   Privacy Protections

    o   Chapter Summary

    o   Key Terms

    o   Review Questions

    o   Hands-On Projects

    o   Case Projects

    o   References

     

    Review Workplace.ppt

    Read Chapter 6

     

    Learn More About:

    Data Brokers

    Data Privacy (Information Privacy)

    Cryptography

     

    Additional Resources:

    Identity Theft Remains Top Threat

    Steganography Revealed

    FTC to Study Data Broker Industry's Collection and Use of Consumer Data

    What is a Digital Signature

    Hardware vs. Software Based Encryption

     

    Week 6 Discussions

    Week 6 Exam

     

    WEEK 7

     

    Topics Covered in CYBER AWARENESS CHALLENGE:

     

    CYBER AWARENESS CHALLENGE (UNCLASSIFED)

     

    Week 7 Discussions

     

    WEEK 8

     

    Final Exam