ITSM 1253 Cyber Security Fundamentals Syllabus H01 Spring 2026

Credit Hours 3.00 Lecture Hours 2 Clinical/Lab Hours 2
Type of Credit
CIP Code
11.1003
Course Meeting Time
W 6:00 PM - 7:30 PM
1/12/2026 - 5/14/2026
D122 Hybrid Lecture/Discussion
Course Description
This course introduces the fundamentals of cyber security technologies. Students will learn about current vulnerabilities and threats to data and the relevant techniques to defend a network from these attacks. Cyber security topics such as vulnerability testing, cryptography, forensics, security engineering, and hacking techniques used by cyber criminals will be covered. Security policy planning and creation, including important legal and ethical standards, will also be discussed.
Prerequisites
Operational knowledge of PCs, software and Internet technologies is required. A strong knowledge of basic networking is also highly recommended.

Faculty Contact Information

Faculty Name
Ron Cooper
Faculty Email
Faculty Student Support Hours

Please email rcooper@kcc.edu for support options

Course Information

Course Outcomes

At the end of this course, students will be able to:

  1. Identify, explain, and defend against threats to data.
  2. Understand and explain the purpose and uses of cybersecurity.
  3. Understand types of cyber fraud and their legal implications.
  4. Identify and explain techniques used by hackers.
  5. Perform network scanning and penetration testing.
  6. Identify and explain various cryptography methods.
  7. Understand, design, and implement security policies.
  8. Understand and utilize internet search technologies.
  9. Understand cybersecurity standards.
Topical Outline
  • Introduction to Computer Security
  • Networks and the Internet
  • Cyber Stalking, Fraud, and Abuse
  • Denial of Service Attacks
  • Malware
  • Techniques used by Hackers
  • Industrial Espionage
  • Encryption
  • Computer Security Technology
  • Security Policies
  • Network Scanning and Vulnerability Testing
  • Cyber Terrorism and Warfare
  • Cyber Detective
  • Introduction to Forensics
  • Cybersecurity Engineering
Textbook/s and Course Materials

Cyber Security Fundamentals 2026SP H01 COURSE - Computer Security Fundamentals 5e

Methods of Evaluation

The corresponding grading scale will be:
90-100% = A
80-89% = B
70-79% = C
60-69% = D
59% or lower = F

Academic Division

Business, Technology & Human Services

Dean, Paul Carlson; 815-802-8858; V105; pcarlson@kcc.edu; Division Office – W102; 815-802-8650

Expectations for Classroom and Online Behavior

Bonus points given for class participation

Course Calendar

Week

Topics

Chapter Readings

Assignments

 

Activities and Testing

1

Introduction to Computer Security

  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources

Chapter 1

Read pp. 2-27

 

Review questions 1-20, pp. 27-30

 

 

Discussion: Case Study, p. 32

 

Exercises 1.1 – 1.5

 

Projects 1.1 – 1.3

 

 

2

Networks and the Internet

  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Cloud Computing

Chapter 2

Read pp. 34-65

 

Review questions 1-25, pp. 65-69

Exercises 2.1 – 2.5

 

Projects 2.1 – 2.3

 

 

3

Cyber Stalking, Fraud, and Abuse

  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cybercrime

Chapter 3

Read pp. 74-99

 

Review questions 1-24 pp. 99-103

Discussion: Case Study, p. 105

 

Exercises 3.1 and 3.2

 

Projects 3.1 – 3.3

 

Quiz #3

4

Denial of Service Attacks

  • DoS Attacks
  • Illustrating an Attack
  • Common Tools Used for DoS Attacks
  • DoS Weaknesses
  • Specific DoS Attacks
  • Real-World Examples of DoS Attacks
  • How to Defend Against DoS Attacks

Chapter 4

Read pp. 106-123

 

Review questions 1-20 pp. 123-126

Discussion: Case Study, p. 129

 

Exercises 4.1 – 4.4

 

Projects 4.1 – 4.3

 

 

5

Malware

  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware

Chapter 5

Read pp. 130-159

 

Review questions 1-20, pp. 159-163

Discussion: Case Study, p. 165

 

Exercises 5.1 – 5.5

 

Projects 5.1 – 5.3

 

 

6

Techniques Used by Hackers

  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • The Dark Web

Chapter 6

Read pp. 166 -194

 

Review questions 1-15, pp 194-197

 

Discussion: Case Study, p. 198

 

Exercises 6.1 – 6.4

 

Projects 6.1 and 6.2

 

 

7

Industrial Espionage in Cyberspace

  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Protecting Against Industrial Espionage
  • Trade Secrets
  • The Industrial Espionage Act
  • Spear Phishing

Chapter 7

 

Read pp. 200-220

 

Review questions 1-15, pp. 220-223

Discussion: Case Study, p. 225

 

Exercises 7.1 – 7.5

 

Projects 7.1 – 7.3

 

 

8

Encryption

  • Cryptography Basics
  • History of Encryption
  • Modern Cryptography Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Quantum Computing Cryptography

Chapter 8

Read pp. 226-261

 

Review questions 1-18, pp. 261-264

 

Discussion: Case Study, p. 266

 

Exercises 8.1 – 8.4

 

Projects 8.1 – 8.3

 

 

9

Computer Security Technology

  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDSs
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security

Chapter 9

Read pp. 268-299

 

Review questions 1-15, pp. 299-301

 

Discussion: Case Study, p. 303

 

Exercises 9.1 – 9.5

 

Projects 9.1 – 9.3

 

 

10

Security Policies

  • What Is a Policy?
  • Important Standards
  • Defining User Policies
  • Defining System Administration Policies
  • Security Breaches
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Zero Trust
  • Important Laws

Chapter 10

Read pp. 304-330

 

Review questions 1-15, pp. 330-333

Discussion: Case Study, p. 335

 

Exercises 10.1 – 10.6

 

Projects 10.1 – 10.3

 

 

11

Network Scanning and Vulnerability Scanning

  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Testing and Scanning Standards
  • Getting Professional Help

Chapter 11

Read pp. 336-369

 

Review questions 1-20, pp. 369-373

Discussion: Case Study, p. 376

 

Exercises 11.1 – 11.9

 

Projects 11.1 – 11.5

 

 

 

12

Cyber Terrorism and Information Warfare

  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases of Cyber Terrorism
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web

Chapter 12

Read pp. 378-402

 

Review questions 1-14, pp. 402-404

Discussion: Case Study, p. 406

 

Exercises 12.1 – 12.5

 

Projects 12.1 – 12.3

 

 

13

Cyber Detective

  • General Searches
  • Company Searches
  • Court Records and Criminal Checks
  • Usenet
  • Google
  • Maltego

Chapter 13

Read pp. 408-421

 

Review questions 1-15, pp. 421-423

Discussion: Case Study, p. 425

 

Exercises 13.1 – 13.5

 

Projects 13.1 – 13.3

 

 

14

 

Introduction to Forensics

  • General Guidelines
  • Finding Evidence on a PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics

Chapter 14

Read pp. 426-463

 

Review questions 1-9, pp. 463-464

Exercises 14.1 – 14.3

 

 

15

Cybersecurity Engineering

  • Defining Cybersecurity Engineering
  • Standards
  • SecML

Chapter 15

Read pp. 466-491

 

Review questions 1-10, pp. 491-493

Exercises 15.1 and 15.2

 

 

College Policies, Resources and Supports

College Policies

For information related to the Student Code of Conduct Policy, Withdrawal Policy, Email Policy, and Non- Attendance/Non-Participation Policy, please review the college’s Code of Campus Affairs and Regulations webpage, which can be found at catalog.kcc.edu under the Academic Regulations & Conduct Guide. 

Resources

KCC offers various academic and personal resources for all students. Many services are offered virtually, as well as in person. Please visit Student Resources - Kankakee Community College to access student resources services such as:

  • Clubs and organizations
  • Counseling and referral services
  • Office of disability services
  • Student complaint policy
  • Transfer services
  • Tutoring services, etc.