INSE 420 Security Strategies for Operating Systems and Applications

Computer operating systems and software application are commonly exploited by hackers.  An in-depth understanding of characteristic risks, threats, and vulnerabilities associated with specific modern operating systems and applications is important in order to protect them.

Credits

5

Cross Listed Courses

None

Prerequisite

All Technology Core courses

Corequisite

None

Washington Technology University

Syllabus

INSE 420 : Security Strategies for Operating Systems and Applications

5 Credits

Approved: 3/10/2021 9:38:26 PM

Course Description

Computer operating systems and software application are commonly exploited by hackers.  An in-depth understanding of characteristic risks, threats, and vulnerabilities associated with specific modern operating systems and applications is important in order to protect them.

Course Required Resources

  • Soloman, Michael, G.  (2014). Security Strategies in Windows Platforms and Applications. Burlington, Massachusetts: Jones & Bartlett.

Course Outcomes

Recognize the key concepts of common operating systems vulnerabilities and describe operating system attack surfaces and mitigations

Discuss forms of user identification and access permissions in an operating system

Explain the purpose of malware and the effects of malicious code on software applications and the operating system

Summarize how to harden computer and network environments using an computer operating system

List common OS security controls and summarize how to use them to harden computer and network environments

Course Keywords

Auditing, Client-server, Cloud computing, HTML,                HTTP, Packet switching, Virtualization, VPN, Clickjacking, Malware, Pretexting, Ransomware, Social Engineering, Advanced Encryption Standard (AES), Digital Certificate, JavaScript, Web application, Vulnerability management, PCI, Resource pooling, Elasticity, Private Cloud, IaaS, PaaS, SaaS, STARS, Service level agreements, Integration testing, Security testing, Stress testing, Security assessment, Nmap, OS

Assignment Summary

Server Hard & Mal Re

250

Assgn, Coll, Part

250

Midterm

250

Final

250

25% Project – Server Hardening and Malware Removal

In this project, students will complete a series of four online labs.  In these labs, students will identify and remove malware from an infected server and workstation, harden a server by configuring security options and managing its services, install and harden a web server as well as enable enhanced web browser security, and concluding the labs by analyzing a server for known vulnerabilities and mitigate those vulnerabilities through remediation. Lab #4, Lab #7, Lab #8, Lab #10.

25% Instructor Determined Assignments, Collaboration and Participation (attendance and online activities)

The instructor will evaluate participation in the course and in online discussions. The instructor may also include other assignments. The instructor-determined assignments and discussions will be distributed and evaluated such that the total point value reflects the weighting given in the rubrics. The instructor will provide the grading criteria, rubrics, and directions for completing these assignments. 

25% Mid Term Exam

Students should be prepared to answer a variety of types of questions pertinent to the concepts covered in or suggested by the course materials, assignments and activities. The instructor may provide additional information about the content, style, and grading criteria of this exam.  The test will cover all concepts covered since the first day of class.

25% Final Exam

Students should be prepared to answer a variety of types of questions pertinent to the concepts covered in or suggested by the course materials, assignments and activities. The instructor may provide additional information about the content, style, and grading criteria of this exam.  The exam will be limited to concepts covered since the mid-term.