INFM 215-10
Network Security
Summer 2022 Syllabus

Dr. Tonia San Nicolas-Rocca
Office Hours:
Virtual office hours. Telephone and in-person advising by appointment

Syllabus Links
Program Learning Outcomes (PLOs)
Canvas Login and Tutorials
iSchool eBookstore

Canvas Information: Courses will be available beginning June 1st, 6 am PT unless you are taking an intensive or a one-unit or two-unit class that starts on a different day. In that case, the class will open on the first day that the class meets.

You will be enrolled in the Canvas site automatically.

Course Description

Covers various technical and administrative aspects of information security and assurance. Includes compliance and operational security; psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security.


Formal assignments for this course are as follows:

Assignments and Due Dates

Learning Outcomes

Portion of Course Grade

Discussion Posts

  • Introduction, due, June 5
  • Discussion Post 1- due, July 10
  • Discussion Post 2 - due, Aug. 6

(CLO 1, CLO 2)



  • InfoSec Labs (1-3) - due, June 6
  • InfoSec Labs (4-7) - due, June 19
  • InfoSec Labs (8-11) - due July 24
  • InfoSec Labs (12-15) - due, Aug. 5

 (CLO 1, CLO 3, CLO 4)



  • Ch. 1 Quiz - due, June 5
  • Ch. 2 Quiz - due, June 5
  • Ch. 3 Quiz - due, June 19
  • Ch. 4 Quiz - due, June 19
  • Ch. 5 Quiz - due, June 19
  • Ch. 6 Quiz - due, July 3
  • Ch. 7 Quiz - due, July 10
  • Ch. 8 Quiz - due, July 17
  • Ch. 9 Quiz - due, July 17
  • Ch. 10 Quiz - due, July 24
  • Ch. 11 Quiz - due, July 24
  • Ch. 12 Quiz - due, July 31
  • Ch. 13 Quiz - due, July 31
  • Ch. 14 Quiz - due, Aug. 5
  • Ch. 15 Quiz - due, Aug. 5

 (CLO 1CLO 2, CLO 3CLO 4, CLO 5)


 Hands-on Assignments

  • Hands-on Assignment 1 - due, June 12
  • Hands-on Assignment 2 - due, July 24
  • Hands-on Assignment 3 - due, Aug. 5



  Students will participate in the discussion board by providing ideas and/or opinions relating to assigned readings and lectures, and current events. Discussion board participation cannot be made-    up once the discussion has been completed.

  Students are to complete lab assignments.  Lab assignments provide students a real-life look at the use of various tools and systems that are used to mitigate network attacks.  Students must have access to Infosec to complete lab assignments. 

  Students will complete quizzes covering assigned readings. 

  Students will complete hands-on assignments. These assignments provide students with an opportunity to use various applications and examine online resources.  

Course Workload Expectations

Success in this course is based on the expectation that students will spend, for each unit of credit, a minimum of forty-five hours over the length of the course (normally 3 hours per unit per week with 1 of the hours used for lecture) for instruction or preparation/studying or course related activities including but not limited to internships, labs, clinical practica. Other course structures will have equivalent workload expectations as described in the syllabus.

Instructional time may include but is not limited to:
Working on posted modules or lessons prepared by the instructor; discussion forum interactions with the instructor and/or other students; making presentations and getting feedback from the instructor; attending office hours or other synchronous sessions with the instructor.

Student time outside of class:
In any seven-day period, a student is expected to be academically engaged through submitting an academic assignment; taking an exam or an interactive tutorial, or computer-assisted instruction; building websites, blogs, databases, social media presentations; attending a study group;contributing to an academic online discussion; writing papers; reading articles; conducting research; engaging in small group work.

Course Prerequisites

INFM 215 has no prequisite requirements.

Course Learning Outcomes

Upon successful completion of the course, students will be able to:

  1. Recall, comprehend, and list various technical considerations for improved network security.
  2. Describe and explain the role of risk mitigation strategies and technologies, including cryptography, access control configurations, firewalls, application security, data protection, and others for network security.
  3. Describe and cite real threats and vulnerabilities to computer networks.
  4. Describe and explain the purpose of planning and policy for secure networks.
  5. Explain the various methods of incident response and disaster recovery.

SLOs and PLOs

This course supports Informatics SLO 6: Identify and evaluate specific information, data, records, and ethics challenges in a defined specialized context (health, sports, cybersecurity), and apply knowledge and skills from foundation courses to design and implement technical user-centered solutions to the specified informatics problem.

SLO 6 supports the following Informatics Program Learning Outcomes (PLOs):

  • PLO 1 Apply technology informatics skills to solve specific industry data and information management problems, with a focus on usability and designing for users.
  • PLO 2 Evaluate, manage, and develop electronic records programs and applications in a specific organizational setting.
  • PLO 3 Demonstrate strong understanding of security and ethics issues related to informatics, user interface, and inter-professional application of informatics in specific fields by designing and implementing appropriate information assurance and ethics and privacy solutions.
  • PLO 4 Identify user needs, ideate informatics products and services, prototype new concepts, and evaluate a prototype's usability.


Required Textbooks:

  • Ciampa, M. (2022). CompTIA security+ guide to network security fundamentals (7th ed.). Cengage. Available through Amazon: 0357424379arrow gif indicating link outside sjsu domain

Grading Scale

The standard SJSU School of Information Grading Scale is utilized for all iSchool courses:

97 to 100 A
94 to 96 A minus
91 to 93 B plus
88 to 90 B
85 to 87 B minus
82 to 84 C plus
79 to 81 C
76 to 78 C minus
73 to 75 D plus
70 to 72 D
67 to 69 D minus
Below 67 F


In order to provide consistent guidelines for assessment for graduate level work in the School, these terms are applied to letter grades:

  • C represents Adequate work; a grade of "C" counts for credit for the course;
  • B represents Good work; a grade of "B" clearly meets the standards for graduate level work or undergraduate (for BS-ISDA);
    For core courses in the MLIS program (not MARA, Informatics, BS-ISDA) — INFO 200, INFO 202, INFO 204 — the iSchool requires that students earn a B in the course. If the grade is less than B (B- or lower) after the first attempt you will be placed on administrative probation. You must repeat the class if you wish to stay in the program. If - on the second attempt - you do not pass the class with a grade of B or better (not B- but B) you will be disqualified.
  • A represents Exceptional work; a grade of "A" will be assigned for outstanding work only.

Graduate Students are advised that it is their responsibility to maintain a 3.0 Grade Point Average (GPA). Undergraduates must maintain a 2.0 Grade Point Average (GPA).

University Policies

Per University Policy S16-9, university-wide policy information relevant to all courses, such as academic integrity, accommodations, etc. will be available on Office of Graduate and Undergraduate Programs' Syllabus Information web page at: Make sure to visit this page, review and be familiar with these university policies and resources.

In order to request an accommodation in a class please contact the Accessible Education Center and register via the MyAEC portal.

icon showing link leads to the PDF file viewer known as Acrobat Reader Download Adobe Acrobat Reader to access PDF files.

More accessibility resources.