Internet Explorer 7, 8, and 9 are no longer supported. Please use a newer browser.
Concourse works best with JavaScript enabled.
San Jose State University logo

College of Professional and Global Education · School of Information

Seminar in Information Science - Cybersecurity
INFO 287

  • Spring 2023
  • Section 14
  • 3 Unit(s)
  • 01/25/2023 to 05/15/2023
  • Modified 05/22/2023

Canvas Information: Courses will be available January 25th, 6 am PT.

You will be enrolled in the Canvas site automatically.

Contact Information

Dr. Tonia San Nicolas-Rocca
Office Hours: Virtually, by appointment via email, in Zoom.

Course Information

Online Resources

  • Canvas Information: This course will use Canvas to manage course documents, assignments, and grades. This course will be available on the first day of the semester. Students will be enrolled into the site automatically.
  • Zoom Information: This course will use Zoom for online lectures and presentations. This course will be available on the first day of the semester. Students will be enrolled into the site automatically.
  • Panopto: This course will use Panopto for online lectures and course information.  Information will be provided to students to access presentations.   
  • TestOut Lab: The labs assigned in this course will be accessed using TestOut. Students will be provided with login information through Canvas.
  • Course name: TestOut Security Pro 
  • Student Login:

Required Lab

Students will be required to use a virtual lab to complete lab assignments.  Students must purchase an online code to access the labs. Professor will provide additional lab information to students.  


  • Word Processor: Microsoft Word, Open Office Writer, or Apple Pages
  • Browser: Chrome, Safari, Edge, Mozilla Firefox or Internet Explorer

Technology Requirements

Course Description and Requisites

This course provides an overview of the challenges and strategies relating to the confidentiality, integrity, and availability of information and information resources. Topics include information systems security (ISS) fundamentals, ISS within the seven domains of a typical information technology (IT) infrastructure, risks, threats, and vulnerabilities found in a typical IT infrastructure, security countermeasures for combating risks, threats, and vulnerabilities commonly found in an IT infrastructure, (ISC)2 Systems Security Certified Practitioner (SSCP®) Common Body of Knowledge – SSCP® domains, and Compliance laws and standards that affect organizations today.


INFO 200, other prerequisites may be added depending on content.

Classroom Protocols


Students are expected to participate fully in all class activities. It is expected that students will be open-minded and participate fully in discussions in class and debate in a mature and respectful manner. Use of derogatory, condescending, or offensive language including profanity is prohibited. Disagreement is healthy and perfectly acceptable. Expressing disagreement should always include an explanation of your reasoning and, whenever possible, evidence to support your position. In accordance with San José State University's Policies, the Student Code of Conduct, and applicable state and federal laws, discrimination based on gender, gender identity, gender expression, race, nationality, ethnicity, religion, sexual orientation, or disability is prohibited in any form.

Program Information

Course Workload

Success in this course is based on the expectation that students will spend, for each unit of credit, a minimum of forty-five hours over the length of the course (normally 3 hours per unit per week with 1 of the hours used for lecture) for instruction or preparation/studying or course-related activities including but not limited to internships, labs, clinical practica. Other course structures will have equivalent workload expectations as described in the syllabus.

Instructional time may include but is not limited to:
Working on posted modules or lessons prepared by the instructor; discussion forum interactions with the instructor and/or other students; making presentations and getting feedback from the instructor; attending office hours or other synchronous sessions with the instructor.

Student time outside of class:
In any seven-day period, a student is expected to be academically engaged through submitting an academic assignment; taking an exam or an interactive tutorial, or computer-assisted instruction; building websites, blogs, databases, social media presentations; attending a study group; contributing to an academic online discussion; writing papers; reading articles; conducting research; engaging in small group work.

Course Goals

Core Competencies (Program Learning Outcomes) Supported

INFO 287 supports the following core competencies:

  1. B Describe and compare organizational settings in which information professionals practice.
  2. H Demonstrate proficiency in identifying, using, and evaluating current and emerging information and communication technologies.
  3. M Demonstrate professional leadership and communication skills.

Course Learning Outcomes (CLOs)

Upon successful completion of the course, students will be able to:

  1. Recognize of the need for cybersecurity or information systems security.
  2. Understand the confidentiality, integrity, and availability of information resources.
  3. Recognize information security threats and vulnerabilities.
  4. Understand information systems security controls.
  5. Analyze the impact of cybersecurity on individuals, organizations, and society, including ethical, legal, security and global policy issues.
  6. Use current techniques, skills, and tools necessary to protect and safeguard information resources.

Course Materials


Recommended Textbooks:

  • Ciampa, M. (2021). CompTIA security+ guide to network security fundamentals (7th ed.). Cengage. Available through Amazon: 0357424379

Course Requirements and Assignments

Formal Assignments for this course are as follows:

Assignment Course
Learning Outcomes
Portion of Course Grade


  • Lab 1-3, due February 12
  • Lab 4-6, due March 12
  • Lab 7-9, due March 26
  • Lab 10-12, due April 16
  • Lab 13-15, due April 30
4, 6 30%


  • Personal Risk Management Project
    • Part 1, due February 12
    • Final Report, due February 26
  • Organizational Risk Management Project
    • Selection, due February 19
    • Part 1, due April 9
    • Part Final Report, due May 7
  • Cybersecurity Research Project
    • Topic Selection, due February 19
    • Status Report, due March 19
    • Research Presentation, due May 15
    • Report due May 15
1, 2, 3, 4, 5, 6 60%


  • Introduction:
    • Post, due January 29
    • Response, due February 5
  • Data Breach Discussion
    • Post, due March 5
    • Response, due March 12
  • Verizon's 2022 Data Breach Investigations Report
    • Post, due April 23
    • Response, due April 30
1, 2, 3, 4, 5 10%
Total   100%
  • Labs (CLO# 4, 6)
    Students are to complete lab assignments. Lab assignments provide students a real-life look at the use of various tools and systems that are used to mitigate network attacks. Students must have access to TestOut to complete lab assignments.
  • Risk Management Projects (CLO# 1, 2, 3, 4, 5, 6)
    Students will complete two risk management projects. The first will require students to conduct a risk, threat, and vulnerability analysis of their residence. The second will require students to conduct a risk, threat, and vulnerability analysis of an organization within an industry of their choice. Students must be able to physically and remotely access their chosen organization's resources (limitations are expected). Students will be required to post the name of the organization of their choice on the discussion board. No more than one student/group can analyze any one particular organization and industry. Therefore, students/groups should select and post their organization to the discussion board as quickly as possible. Students/groups will be required to submit their findings in a written report to the instructor. Students/groups will also share their findings on the discussion board.
  • Research Report and Presentation (CLO# 1, 2, 3, 4, 5, 6)
    Each student/group will conduct research and present their findings on a current cybersecurity topic area. Students/groups must propose their research project to the instructor by the end of the second week of the semester. No more than one student/group can research any one particular topic area. Therefore, students/groups should select and propose their research topic to the instructor as quickly as possible
  • Class Participation (CLO# 1, 2, 3, 4, 5)
    Students will participate in the discussion board by providing ideas and/or opinions relating to research topics, risk management projects, current events, and assigned readings and lectures. Discussion board participation cannot be made-up once the discussion has been completed.

Grading Information

The standard SJSU School of Information Grading Scale is utilized for all iSchool courses:

97 to 100A
94 to 96A minus
91 to 93B plus
88 to 90B
85 to 87B minus
82 to 84C plus
79 to 81C
76 to 78C minus
73 to 75D plus
70 to 72D
67 to 69D minus
Below 67F


In order to provide consistent guidelines for assessment for graduate level work in the School, these terms are applied to letter grades:

  • C represents Adequate work; a grade of "C" counts for credit for the course;
  • B represents Good work; a grade of "B" clearly meets the standards for graduate level work or undergraduate (for BS-ISDA);
    For core courses in the MLIS program (not MARA, Informatics, BS-ISDA) — INFO 200, INFO 202, INFO 204 — the iSchool requires that students earn a B in the course. If the grade is less than B (B- or lower) after the first attempt you will be placed on administrative probation. You must repeat the class if you wish to stay in the program. If - on the second attempt - you do not pass the class with a grade of B or better (not B- but B) you will be disqualified.
  • A represents Exceptional work; a grade of "A" will be assigned for outstanding work only.

Graduate Students are advised that it is their responsibility to maintain a 3.0 Grade Point Average (GPA). Undergraduates must maintain a 2.0 Grade Point Average (GPA).

University Policies

Per University Policy S16-9 (PDF), relevant university policy concerning all courses, such as student responsibilities, academic integrity, accommodations, dropping and adding, consent for recording of class, etc. and available student services (e.g. learning assistance, counseling, and other resources) are listed on the Syllabus Information web page. Make sure to visit this page to review and be aware of these university policies and resources.