Skagit Valley College

Catalog Course Search Details

New Course: this course was added after the last catalog

 Course Title:   Data Security

 Title Abbreviation:   DATA SECURITY

 Department:    IMDS

 Course #:    245

 Credits:    5

 Variable:     No

 IUs:    5

 CIP:    30.7101

 EPC:    573

 REV:    2021


 Course Description  

Introduction to current topics in network security, including computer security and incident response, disaster recovery issues such as identifying, quantifying, planning for and managing risks, fault tolerance, disaster planning, system backups, and hands-on system recovery. Hands-on introduction to skill sets which include information protection, advanced threat analytics and cloud services security.

 Prerequisite  

Prerequisite: IMDS 110 with a grade of C or higher.

Additional Course Details

Contact Hours (based on 11 week quarter)

Lecture: 55

Lab: 0

Other: 0

Systems: 0

Clinical: 0


Intent: Distribution Requirement(s) Status:  

Vocational Preparatory Required for ATA degree  

Equivalencies At Other Institutions

Other Institution Equivalencies Table
Institution Course # Remarks
N/A

Learning Outcomes

After completing this course, the student will be able to:

  1. Recognize various methods of identifying, quantifying, and planning for security risks.
  2. Compare various methods of monitoring and managing security risks.
  3. Identify how to fault tolerance and plan for disaster, including cybercrimes.
  4. Perform system backups and post disaster system recovery options.
  5. Employ organizational security preparation, processes, and responses.
  6. Design a fault tolerant system and drafting a disaster recovery plan.

General Education Learning Values & Outcomes

Revised August 2008 and affects outlines for 2008 year 1 and later.

Course Contents

  1. Best practices for identifying, quantifying, and planning for security risks in enterprise security landscapes.
  2. Implementation of best practices for securing, monitoring, and managing a network.
  3. Perform system backups and use them to recover from simulated disasters.
  4. Protect, detect, and respond to cybercrime.
  5. Explore the capabilities of threat detection and mitigation tool.