This document provides information about a Real Estate Law course including the instructor's contact details, class meeting times, course description and goals, required textbook, student learning outcomes, academic honesty policy, evaluation methods and grading scale, exam format, class schedule, and ADA statement. The course covers California real estate property law and fulfills requirements for a real estate license. It will analyze legal problems logically, identify relevant issues, and utilize legal terminology. Students will be evaluated through midterm and final multiple choice exams, class participation, and a group paper. The final exam will be on December 10th.
eTROYTerrorism CJ4440Term Five 2013For course syllabus pos.docxgitagrimston
eTROY
Terrorism CJ4440
Term Five 2013
For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor will notify students, via e-mail or Blackboard announcement, when changes are made in the requirements or grading of the course.
eTROY Courses at Troy University
All eTROY courses at Troy University utilize the Blackboard Learning System. In every eTROY course, students should read all information presented in the Blackboard course site and should periodically check for updates-at least every 48 hours. Remember: This is not a “correspondence course” in which a student may work at his/her own pace. Each week there are assignments, online discussions, online activities and/or exams with due dates. Refer to the schedule at the end of the syllabus for more information.
Instructor Information
James Smith
Department of Criminal Justice
Troy University (Dothan Campus)
Malone Hall Room 123
Telephone: 334 -983-6556 Extension 1313
Email address: [email protected]
Office Hours: 7 am – 6 pm Monday - Thursday
Instructor Education
Master of Science in Safety, University of Southern California
Bachelor of Science, Troy University
Course Description
Course Description: This course provides the student a basic understanding and definition of terrorism and threat groups, motivation and mindset of a variety of domestic and international terrorist and threat groups is examined. The structure of terrorist organizations along with methods used to attack selected targets is addressed. A variety of terrorist campaigns, target selection, and mode of operation will be explored. The effect of the media on terrorism, the targets selected, and reaction by the public will be examined. The interaction of legislation and Constitutional issues are reviewed. Countermeasures and antiterrorism methods will be assessed.
Course Objectives
1. To provide an understanding of terrorism and homeland security in relation to criminal justice.
2. To provide an overview of homeland security and the changes wrought by the information age, Internet and computers.
3. To provide an overview of the general principles, finances, typology, organizational structures and group dynamic theory of international and domestic terrorism are studied.
4. The concepts of target assessment, hardening and layered defenses are discussed.
5. The philosophies of various terrorist groups are explored.
6. The law enforcement role in homeland security is discussed.
7. The concepts of “lone wolf attacks”, single cause and multiple cause groups, religious and other extremist groups are discussed.
8. The application of homeland security concepts in law enforcement, judicial system, probation and parole along with corrections are discussed.
9. The Patriot Acts, current legal issues, civil, liberties, privacy and Constitutional issues are explored.
Student Learning Outcomes
1. Explain the significance of orga ...
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi ...
Syllabus Access Control, Authentication, and Public Key Infrast.docxmabelf3
Syllabus: Access Control, Authentication, and Public Key Infrastructure
University of the Cumberlands
School of Computer and Information Sciences
ITS 630 – Organization Leadership and Decision Making
Course Summary
Course Number and Name
ITS 630 – Organization Leadership and Decision Making
Course Term and Delivery
Fall IG, 2018
Asynchronous Online Course
Course Instructor
Dr. Greg Gleghorn
Email: [email protected]
Catalog Course Description
One of the most important skills a business leader needs to have concerning technology involves effective decision making and governance. This class will consist of a case study approach presenting different scenarios that require decisions to be made on technology issues that are relevant to today’s business environment. Students will develop the skills for understanding the components and elements of these technology decisions, and assess associated risks. This course will draw upon a cross section of technology, finance, security, project management, leadership, and other aspects of effective decision making.
Course Objectives
Course Competencies/ Learning Objectives
Course Learning Objectives
Major Instructional Areas
Assessment Method
Develop IT strategy for business value.
DB Posts, assignments, quizzes, exams
Understand business metrics.
DB Posts, assignments, quizzes, exams
Understand how to communicate with business managers.
DB Posts, assignments, quizzes, exams
Understand the management of IT-based risk.
DB Posts, assignments, quizzes, exams
Create and evolve a technology roadmap.
DB Posts, assignments, quizzes, exams
SCANS Objectives
SCANS is an acronym for Secretary’s Commission on Achieving Necessary Skills. The committee, appointed by the National Secretary of Labor in 1990, created a list of skills and competencies that continue to be a valuable resource for individuals developing their careers in a high-tech job market. For more information on the SCANS objectives, visit The U.S. Department of Labor Employment and Training Administration: www.doleta.gov.
Course Structure
· Watch weekly lecture
· Participate in class discussion via iLearn forums
· Reading assigned texts
· Complete quizzes based on assigned reading and lecture
· Complete cases based upon a given scenario
· Complete homework assignments from the text and other sources
Learning Materials and References
Required Resources
Textbook(s) Required:
· McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson.
Recommended Materials/Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
· Aaron K. Olson, B. Keith Simerson
Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results
· Alfred A. Marcus
The Future of Technology Management and the Business Environment: Lessons on Innovation, Disruption, .
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
eTROYTerrorism CJ4440Term Five 2013For course syllabus pos.docxgitagrimston
eTROY
Terrorism CJ4440
Term Five 2013
For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor will notify students, via e-mail or Blackboard announcement, when changes are made in the requirements or grading of the course.
eTROY Courses at Troy University
All eTROY courses at Troy University utilize the Blackboard Learning System. In every eTROY course, students should read all information presented in the Blackboard course site and should periodically check for updates-at least every 48 hours. Remember: This is not a “correspondence course” in which a student may work at his/her own pace. Each week there are assignments, online discussions, online activities and/or exams with due dates. Refer to the schedule at the end of the syllabus for more information.
Instructor Information
James Smith
Department of Criminal Justice
Troy University (Dothan Campus)
Malone Hall Room 123
Telephone: 334 -983-6556 Extension 1313
Email address: [email protected]
Office Hours: 7 am – 6 pm Monday - Thursday
Instructor Education
Master of Science in Safety, University of Southern California
Bachelor of Science, Troy University
Course Description
Course Description: This course provides the student a basic understanding and definition of terrorism and threat groups, motivation and mindset of a variety of domestic and international terrorist and threat groups is examined. The structure of terrorist organizations along with methods used to attack selected targets is addressed. A variety of terrorist campaigns, target selection, and mode of operation will be explored. The effect of the media on terrorism, the targets selected, and reaction by the public will be examined. The interaction of legislation and Constitutional issues are reviewed. Countermeasures and antiterrorism methods will be assessed.
Course Objectives
1. To provide an understanding of terrorism and homeland security in relation to criminal justice.
2. To provide an overview of homeland security and the changes wrought by the information age, Internet and computers.
3. To provide an overview of the general principles, finances, typology, organizational structures and group dynamic theory of international and domestic terrorism are studied.
4. The concepts of target assessment, hardening and layered defenses are discussed.
5. The philosophies of various terrorist groups are explored.
6. The law enforcement role in homeland security is discussed.
7. The concepts of “lone wolf attacks”, single cause and multiple cause groups, religious and other extremist groups are discussed.
8. The application of homeland security concepts in law enforcement, judicial system, probation and parole along with corrections are discussed.
9. The Patriot Acts, current legal issues, civil, liberties, privacy and Constitutional issues are explored.
Student Learning Outcomes
1. Explain the significance of orga ...
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi ...
Syllabus Access Control, Authentication, and Public Key Infrast.docxmabelf3
Syllabus: Access Control, Authentication, and Public Key Infrastructure
University of the Cumberlands
School of Computer and Information Sciences
ITS 630 – Organization Leadership and Decision Making
Course Summary
Course Number and Name
ITS 630 – Organization Leadership and Decision Making
Course Term and Delivery
Fall IG, 2018
Asynchronous Online Course
Course Instructor
Dr. Greg Gleghorn
Email: [email protected]
Catalog Course Description
One of the most important skills a business leader needs to have concerning technology involves effective decision making and governance. This class will consist of a case study approach presenting different scenarios that require decisions to be made on technology issues that are relevant to today’s business environment. Students will develop the skills for understanding the components and elements of these technology decisions, and assess associated risks. This course will draw upon a cross section of technology, finance, security, project management, leadership, and other aspects of effective decision making.
Course Objectives
Course Competencies/ Learning Objectives
Course Learning Objectives
Major Instructional Areas
Assessment Method
Develop IT strategy for business value.
DB Posts, assignments, quizzes, exams
Understand business metrics.
DB Posts, assignments, quizzes, exams
Understand how to communicate with business managers.
DB Posts, assignments, quizzes, exams
Understand the management of IT-based risk.
DB Posts, assignments, quizzes, exams
Create and evolve a technology roadmap.
DB Posts, assignments, quizzes, exams
SCANS Objectives
SCANS is an acronym for Secretary’s Commission on Achieving Necessary Skills. The committee, appointed by the National Secretary of Labor in 1990, created a list of skills and competencies that continue to be a valuable resource for individuals developing their careers in a high-tech job market. For more information on the SCANS objectives, visit The U.S. Department of Labor Employment and Training Administration: www.doleta.gov.
Course Structure
· Watch weekly lecture
· Participate in class discussion via iLearn forums
· Reading assigned texts
· Complete quizzes based on assigned reading and lecture
· Complete cases based upon a given scenario
· Complete homework assignments from the text and other sources
Learning Materials and References
Required Resources
Textbook(s) Required:
· McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson.
Recommended Materials/Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
· Aaron K. Olson, B. Keith Simerson
Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results
· Alfred A. Marcus
The Future of Technology Management and the Business Environment: Lessons on Innovation, Disruption, .
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
Similar to KENDRICK KIM_SYLLABUSFALL2014_RE 102F (20)
1. RE 102 F-Legal Aspects of Real Estate Fall 2014
Subject to change
Instructor: Mr. Kendrick K. Kim
Contact info: (714) 402-7363 (mobile, Text)
E-Mail: kkim1@fullcoll.edu
Scheduled Class meetings: Wednesdays: 3:30p.m. to 6:40 p.m.
*ALL MOBILE DEVICES MUST BE TURNED OFF DURING THE DURATION OF
THE CLASS. *
Course Description
This course covers California real estate property law. Topics include acquisitions and
transfers, methods and incidents of ownership, easements, fixtures, land descriptions,
recording, covenants, conditions, and restrictions, zoning ordinances, leases, brokers,
escrow, title insurance and probate proceedings. This course fulfills the educational
prerequisite for California state licensing requirements and meets the Fullerton College
certificate requirements. (CSU) (Degree Credit)
Required Text
California Real Estate Law: Text and Cases, Author Gordon, Theodore H.: -Eight Edition
ISBN: 10: 0-538-73613-5/13: 978-0-538-73613-8
Student Learning Outcomes
Upon Completion of this course, students will be able to
1. Upon successful completion of RE 102 F, Legal Aspects of Real Estate, the
student will be able to analyze real estate legal problems in a logical manner.
2. Upon successful completion of RE 102 F, Legal Aspects of Real Estate, the
student will be able to identify, define, evaluate, compare and explain relevant
legal issues relating to California real estate transactions and land titles.
3. Upon successful completion of RE 102 F, Legal Aspects of Real Estate, the
student will be able to utilize a working vocabulary of real estate legal
terminology.
Course Goals and Objectives:
The student should be able to achieve the following goals and objectives upon the
successful completion of this course:
1. To recognize and understand the legal implications of basic documents pertaining
to real estate ownership and transfer of legal interests in real estate;
2. 2. To understand the legal requirements and implications of the rights and duties of
the owners of any interest in real estate;
3. To understand the legal implications of conveyance problems and the basic
documents used to correct these problems.
4. To understand the basic concepts that apply to government regulation and control
of real state, including the issues surrounding eminent domain; and
5. To understand the legal issues and generally accepted practices of the California
real estate industry relating to the areas of escrow and title insurance, zoning,
landlord-tenant practices and problem areas, real estate brokerage and agency
rules, requirements and problems; and ethical requirements and issues for real
estate agents and brokers.
Academic Honesty: The use of unauthorized material, communication with fellow
students during an exam, attempting to benefit from the work of another and similar
behavior that defeats the intent of the examination or assignment is unacceptable.
Copying assignments is specifically prohibited. Any violation of this policy will result in
student receiving a zero on the examination or all papers and whatever further action is
decided necessary by the College. (See college catalog for Academic Honesty Policy.)
ADA Statement: Fullerton College is committed to providing reasonable
accommodations for students with disabilities upon request of the student (in a timely
fashion) and upon verification of disability.
Disabled Students/Learning Resources Disability Support Services (714-992-7099)
Room 804
Evaluation Method
MIDTERMS & FINAL EXAMS ARE TO BE ANSWERED ON SCANTRON FORM
NO 882-E
GRADING
Grading is on the point system
100 pts – Midterm exam (50 questions of Multiple choice and true/false)
200 pts – Final Exam (100 questions of Multiple choice and true/false)
50 pts – class participation
50 pts – Group Paper (3-5 pages, due December 3, 2014)
A = 360- 400 C = 280- 319 FAIL = 239 and below
B = 320-359 D = 240-279
3. NO MAKE-UP QUIZES/EXAMS
NOTE: all questions on the mid-term and final exams will be taken from the lecture,
textbook material, and chapter quizzes. The instructor will try as often as possible to
cover the questions during the lecture, but this may not always be possible. It is highly
recommended that you attend each class session and read each assigned chapter prior to
the class meeting.
CLASS SCHEDULE
Subject to Change
August 27 Introduction, Chapter 1, and Chapter 2
September
3 Chapter 3-4
10 Chapter 5-6
17 Chapter 7-8
24 Chapter 9-10
October
1 Chapter 11-12
8 Chapter 13-14
15 Chapter 15-16
22 MIDTERM EXAM (Chapters 1-16)
29 Chapter 17-18
November
5 Chapter 19-20
12 Chapter 21
19 Chapter 22
26 Chapter 23
December
3 Final Exam review, guest speaker (s), “Putting it all together”
10 Final Exam