Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to CIS 4680: Introduction to Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course.

Similar presentations


Presentation on theme: "Introduction to CIS 4680: Introduction to Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course."— Presentation transcript:

1 Introduction to CIS 4680: Introduction to Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course Materials Grading Peer Evaluation How to succeed in this course

2 Course Objectives Course Syllabus http://www3.cis.gsu.edu/cstucke/cis4680/CIS4680IntroductiontoSecurityan dPrivacySpring2010.htm Objectives: What information security and privacy are? Stakeholders. Nature of the environment and threats Countermeasures Policies and practices for information security and privacy Threat scenario recognition and analysis Business Continuity Planning Risk analysis Related laws, standards, and codes of practice The National Critical Infrastructure

3 Groups Group Formation ( http://www3.cis.gsu.edu/cstucke/common/TeamDynamics.pdf ) http://www3.cis.gsu.edu/cstucke/common/TeamDynamics.pdf 3-4 people per group (form these in the next 7 days) Group work: Session participation Security Issues Term Paper

4 Conduct of the Course SharePoint Invited speakers (still changing, some recorded) Sample session schedule: 4:30-4:40 Action Items from last session 4:40-5:50 Speaker/Instructor/Group led session 5:50-6:00 Break 6:00-6:25 Group: develop & post case analysis 6:25-6:40 Group: analyze & rate other analyses 6:40-7:00 Groups present ratings

5 Conduct of the Course Use CIS4680 SharePoint site https://undergrad.robinson.gsu.edu/courses/CIS4680/20100117242/default.aspx https://undergrad.robinson.gsu.edu/courses/CIS4680/20100117242/default.aspx Session Objectives Exams Bulletin Board Group project postings And more (all on the way)

6 Exams Mid-term and Final Exams Take-home Open notes and course materials No other help (direct or indirect during exam period) Sample of exam format in SharePoint (soon)

7 Course Materials Course Materials at http://www3.cis.gsu.edu/cstucke/cis8680/content/ (shared with 8680/8080) http://www3.cis.gsu.edu/cstucke/cis8680/content/ Username and Password required (I’ll give you these in the first session.) Materials subject to change during course Finding better materials is a major participation plus (post these on the SharePoint bulletin board)

8 Grading The syllabus is the official document for all course information Individual Exams are each 20% of final grade Group Security Issues Term Paper is 20% Group Labs and Cases is 20% Class individual & group participation is 20% Individual scores for group work are the group score * peer evaluation

9 Peer Evaluation Done at mid-term and end of course The mid-term score is informational and gives your team mates a chance to do better The end-of-course score is used in grade calculation The peer evaluation can make letter grade differences in your final grade Be a strong team player Give honest feedback. Do not surprise anyone with their end-of-course peer evaluation http://www3.cis.gsu.edu/cstucke/cis4680/PeerEvaluation4680.htm

10 How to Succeed in this Course Study schedule-linked materials before sessions Actively participate as a group both in sessions & in posting materials Produce group studies, papers, labs, and presentations that exceed requirements and the previous classes’ products Carry your part of the group’s work (and be sure your group understands your contributions) Excel on exams (especially scenarios) by understanding course concepts and their application

11 Q&A


Download ppt "Introduction to CIS 4680: Introduction to Information Security and Privacy Course Objectives Group Formation and Function Conduct of the Course Exams Course."

Similar presentations


Ads by Google