COMPSFI 214 - Information Security System Analysis
City Colleges of Chicago
This course examines the integral components of effective Cybersecurity practices including Threat Management, Vulnerability Management, Cyber Incident Response, and Security Architecture. The course provides an overview of the challenges faced when attempting to build and maintain secure systems in a networked environment and explores the monitoring of systems for identification and response to intrusions and breaches. Writing assignments, as appropriate to the discipline, are part of the course.
Year
Course Overview
- Analyze cybersecurity threats, risks, and vulnerabilities from a systems perspective
- Examine how organizations design and maintain secure information systems
- Study incident response processes and security operations
- Evaluate security architectures using defense-in-depth principles
- Understand the role of policies, standards, and frameworks in cybersecurity
- Develop written analyses and reports communicating security findings and recommendations
This course provides foundational knowledge applicable to careers in cybersecurity, information assurance, risk management, and security operations.
Course Objectives
- Identify and analyze common cyber threats and attack vectors
- Assess vulnerabilities in information systems and networked environments
- Explain incident response lifecycle phases and operational procedures
- Evaluate security architectures and control implementations
- Apply risk management concepts to cybersecurity decision-making
- Interpret and apply industry standards, frameworks, and best practices
- Communicate technical and strategic security concepts through professional writing
Instructor
Dr. Md Ali
Email: mali220@ccc.edu
Office Hours: By appointment / Virtual drop-ins via Zoom
Materials
(ISC)² Official Study Guide – CISSP (Certified Information Systems Security Professional)
Latest Edition
Wiley Publishing
The CISSP Official Study Guide serves as the primary reference for this course and aligns with industry-recognized security domains, terminology, and best practices.
Assignments & Labs
- Written security analyses and case studies
- Risk and architecture evaluations
- Quizzes and exams
- Applied exercises and discussions
All assignments must be submitted through Brightspace, unless otherwise specified.
Late Policy:
Assignments are due by 11:59 PM on the scheduled date.
Late work may be accepted with prior approval.
Academic Integrity
Ethical conduct is fundamental to the field of cybersecurity. Students are expected to adhere to all academic integrity policies. Plagiarism, unauthorized collaboration, or misuse of systems and tools outside approved activities will result in disciplinary action.
Announcements
Check here or on Brightspace for the latest course updates and deadlines.