!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> 3360 Syllabus

ISQS 3360 - Telecommunications Security

Syllabus - Spring 2019

Instructor: John R Durrett

Office Hours: MWF 1-2 or anytime by phone or email

Office: BA E303

Phones: mobile 806-438-2049, home 806-687-9028, office 834-0629

Email: john.durrett@ttu.edu Class web page: http://jdurrett.ba.ttu.edu
  1. Prerequisites:
  2. Supplies: 
  3. Course Learning Objectives:
    This course focuses on state-of-the art telecom technologies and their application to organizational security problems. The primary intent is to provide a forum for the discussion of the strategic application of current technology while maintaining an awareness of appropriate ethical, privacy and security issues. Even though this course uses a certification review text it is not my purpose to teach the exam.
  4. Methodology:
    In a departure from my typical methodology, this class will be conducted primarily using Powerpoint with in class discussions. 
  5. Academic Conduct:
    The Texas Tech policy for academic affairs applies to all students, at all times. Any student who violates the academic conduct policy will be subjected to the appropriate disciplinary sanctions (Student Affairs Handbook). In absence of evidence to the contrary, students will be treated as trustworthy, honest, and just.
  6. Disabled Students:
    Any student who, because of a disability, may require special arrangements in order to meet the course requirements should contact the instructor as soon as possible to make any necessary arrangements. Students should present appropriate verification from Student Disability Services during the instructorâ??s office hours. Please note instructors are not allowed to provide classroom accommodations to a student until appropriate verification from Student Disability Services has been provided. For additional information, you may contact the Student Disability Services office in 335 West Hall or 806-742-2405.
  7. Attendance:
    I take attendance during class, sometimes.  The purpose of this attendance role is to enable grade decisions at the end of the semester.  If a student is "borderline" (in either direction) attendance is considered in raising or lowering the final grade.  In addition, I periodically make changes to exam dates, homework due dates, homework assignments, extra credit assignments, exam bonuses, and other class structural issues.  If a student misses one of these class announcements for any reason it is their responsibility to find out about the change.  The instructor is NOT responsible for informing students individually.

  8. Assesment and Grading policy:
    Given the everchaning nature of and complexity of threats to organizational computer security along with the expanding prevelence of such threats it is hoped that students enrolled in this course have a desire to learn the concepts involved. Reflecting this desire along with a hoped for high level of student maturity the quality of each student's understanding of the above learning objectives will be assessed (and grades will be assigned) based primarily on class individual assignments and projects with exams & quizes used to verify the accuracy of the project grades. 
    In general your grade will be determined as follows:

    exams & quiz(es)


    presentations of security policy or other "how-to"


    Security Policy Paper DUE 12/6 in my email 30%
    class participation (discussion, new links) 15%





    Student presentations will be graded primarily by the instructor with class input.  All presentations must be done in a professional manner (I do not care about dress.  You may use any presentation style and software that you wish (Students are responsible for determining software availability in the classroom :) My assumption is that presentations will be about 30 minutes in length & that we can do 2 student presentations per class day. Presentation topic can be either a preliminary overview of the project paper you are writting or can cover an area in security management (or a specific current security breach) that is of particular interest to the student.

    Security Policy Paper: Write a paper giving me a real world example of an organizational security policy, security standards, and security guidelines for a real business. Please write your own security policy, do not simply copy a company's policy! You may use some of an organization's ideas, but I want your paper to reflect on the concepts talked about in class. I prefer one written for an orgainzation where you have worked. However, if that is not possible an organization you are familiar with, for instance a University Business School. Grades will be based on how well your paper reflects understanding of both the "theoretical" topics from class notes and the "real world" discussion from our mini-case study links.

    Class participation Given the lecture nature of this course your participation is a must. Grades will be based on various factors, but mostly how much you help me by discussing the slides and mini-case study links.

  9. Preliminary Class Outline.
  10. Required Guidelines: