D122 Hybrid Lecture/Discussion
Faculty Contact Information
Please email rcooper@kcc.edu for support options
Course Information
At the end of this course, students will be able to:
- Identify, explain, and defend against threats to data.
- Understand and explain the purpose and uses of cybersecurity.
- Understand types of cyber fraud and their legal implications.
- Identify and explain techniques used by hackers.
- Perform network scanning and penetration testing.
- Identify and explain various cryptography methods.
- Understand, design, and implement security policies.
- Understand and utilize internet search technologies.
- Understand cybersecurity standards.
- Introduction to Computer Security
- Networks and the Internet
- Cyber Stalking, Fraud, and Abuse
- Denial of Service Attacks
- Malware
- Techniques used by Hackers
- Industrial Espionage
- Encryption
- Computer Security Technology
- Security Policies
- Network Scanning and Vulnerability Testing
- Cyber Terrorism and Warfare
- Cyber Detective
- Introduction to Forensics
- Cybersecurity Engineering
Cyber Security Fundamentals 2026SP H01 COURSE - Computer Security Fundamentals 5e
The corresponding grading scale will be:
90-100% = A
80-89% = B
70-79% = C
60-69% = D
59% or lower = F
Business, Technology & Human Services
Dean, Paul Carlson; 815-802-8858; V105; pcarlson@kcc.edu; Division Office – W102; 815-802-8650
Bonus points given for class participation
Week | Topics | Chapter Readings | Assignments
| Activities and Testing |
1 | Introduction to Computer Security
| Chapter 1 | Read pp. 2-27
Review questions 1-20, pp. 27-30
| Discussion: Case Study, p. 32
Exercises 1.1 – 1.5
Projects 1.1 – 1.3
|
2 | Networks and the Internet
| Chapter 2 | Read pp. 34-65
Review questions 1-25, pp. 65-69 | Exercises 2.1 – 2.5
Projects 2.1 – 2.3
|
3 | Cyber Stalking, Fraud, and Abuse
| Chapter 3 | Read pp. 74-99
Review questions 1-24 pp. 99-103 | Discussion: Case Study, p. 105
Exercises 3.1 and 3.2
Projects 3.1 – 3.3
Quiz #3 |
4 | Denial of Service Attacks
| Chapter 4 | Read pp. 106-123
Review questions 1-20 pp. 123-126 | Discussion: Case Study, p. 129
Exercises 4.1 – 4.4
Projects 4.1 – 4.3
|
5 | Malware
| Chapter 5 | Read pp. 130-159
Review questions 1-20, pp. 159-163 | Discussion: Case Study, p. 165
Exercises 5.1 – 5.5
Projects 5.1 – 5.3
|
6 | Techniques Used by Hackers
| Chapter 6 | Read pp. 166 -194
Review questions 1-15, pp 194-197
| Discussion: Case Study, p. 198
Exercises 6.1 – 6.4
Projects 6.1 and 6.2
|
7 | Industrial Espionage in Cyberspace
| Chapter 7 |
Read pp. 200-220
Review questions 1-15, pp. 220-223 | Discussion: Case Study, p. 225
Exercises 7.1 – 7.5
Projects 7.1 – 7.3
|
8 | Encryption
| Chapter 8 | Read pp. 226-261
Review questions 1-18, pp. 261-264
| Discussion: Case Study, p. 266
Exercises 8.1 – 8.4
Projects 8.1 – 8.3
|
9 | Computer Security Technology
| Chapter 9 | Read pp. 268-299
Review questions 1-15, pp. 299-301
| Discussion: Case Study, p. 303
Exercises 9.1 – 9.5
Projects 9.1 – 9.3
|
10 | Security Policies
| Chapter 10 | Read pp. 304-330
Review questions 1-15, pp. 330-333 | Discussion: Case Study, p. 335
Exercises 10.1 – 10.6
Projects 10.1 – 10.3
|
11 | Network Scanning and Vulnerability Scanning
| Chapter 11 | Read pp. 336-369
Review questions 1-20, pp. 369-373 | Discussion: Case Study, p. 376
Exercises 11.1 – 11.9
Projects 11.1 – 11.5
|
12 | Cyber Terrorism and Information Warfare
| Chapter 12 | Read pp. 378-402
Review questions 1-14, pp. 402-404 | Discussion: Case Study, p. 406
Exercises 12.1 – 12.5
Projects 12.1 – 12.3
|
13 | Cyber Detective
| Chapter 13 | Read pp. 408-421
Review questions 1-15, pp. 421-423 | Discussion: Case Study, p. 425
Exercises 13.1 – 13.5
Projects 13.1 – 13.3
|
14 |
Introduction to Forensics
| Chapter 14 | Read pp. 426-463
Review questions 1-9, pp. 463-464 | Exercises 14.1 – 14.3
|
15 | Cybersecurity Engineering
| Chapter 15 | Read pp. 466-491
Review questions 1-10, pp. 491-493 | Exercises 15.1 and 15.2
|
College Policies, Resources and Supports
For information related to the Student Code of Conduct Policy, Withdrawal Policy, Email Policy, and Non- Attendance/Non-Participation Policy, please review the college’s Code of Campus Affairs and Regulations webpage, which can be found at catalog.kcc.edu under the Academic Regulations & Conduct Guide.
KCC offers various academic and personal resources for all students. Many services are offered virtually, as well as in person. Please visit Student Resources - Kankakee Community College to access student resources services such as:
- Clubs and organizations
- Counseling and referral services
- Office of disability services
- Student complaint policy
- Transfer services
- Tutoring services, etc.
The materials on this course are only for the use of students enrolled in this course for purposes associated with this course. Further information regarding KCC's copyright policy is available at https://kcc.libguides.com/copyright.
|Course syllabus/calendar is subject to change.