Academic Catalog

ITSC 130: INTRUSION SYSTEMS

Foothill College Course Outline of Record

Foothill College Course Outline of Record
Heading Value
Units: 0.5
Hours: 8 lecture, 4 laboratory per quarter (12 total per quarter)
Prerequisite: Completion of recognized sound and communication apprenticeship or equivalent and recent employment as an installer/technician in the sound and communication industry.
Degree & Credit Status: Degree-Applicable Credit Course
Foothill GE: Non-GE
Transferable: None
Grade Type: Letter Grade (Request for Pass/No Pass)
Repeatability: Not Repeatable

Description

Covers the applicable standards, preventing false alarms, components, wiring and installation of intrusion systems.

Course Objectives

The student will be able to:
A. Describe the purpose of an intrusion system and statistics associated with burglary
B. Identify the components of an intrusion system
C. Identify specifications for magnetic contacts
D. Identify various different magnetic contacts and the applications they can be used for
E. Describe the difference between a closed loop and an open loop configuration
F. Identify various types of motion detectors

Course Content

A. Introduction (Lec)
1. What is an intrusion system?
2. Types of systems used today
B. Applicable Standards (Lec)
1. NFPA 70
2. NFPA 72
3. NFPA 730
4. NFPA 731
C. Fundamentals (Lec)
1. Protection strategies
2. Intrusion system monitoring
3. Detection/wiring configurations
4. False alarms
D. Sensors and Input Devices (Lec)
1. Magnetic contact design
2. Types of magnetic contacts
3. Motion detectors
4. Glass break detectors
E. Control Panels and Keypads (Lec)
1. Panel connections
2. Keypads
F. Hands-on Intrusion Lab (Lab)
1. Build small scale intrusion system

Lab Content

A. Work individually and in teams with basic tools of the trade, test instruments and tool safety.
B. Included will be the installation of sound and/or communication devices.
C. Equipment safety and safe handling practices are reviewed and applied.

Special Facilities and/or Equipment

A. Intrusion cabling and equipment for hands-on lab.
B. When taught via Foothill Global Access, on-going access to email software and hardware; email address.

Method(s) of Evaluation

Methods of Evaluation may include but are not limited to the following:

A. Results of assessments
B. Results of quizzes and tests
C. Discussion participation

Method(s) of Instruction

Methods of Instruction may include but are not limited to the following:

A. Lecture
B. Group discussion
C. Demonstration
D. Lab

Representative Text(s) and Other Materials

Handouts and/or worksheets provided by course instructor.

 

Types and/or Examples of Required Reading, Writing, and Outside of Class Assignments

A. Reading assignments:

1. Read Lesson 10: "False Alarms - What is and what isn't"

2. Read Lesson 15 regarding Motion Detectors

B. Writing assignments:

1. Describe why false alarms are a major issue with intrusion systems and include methods used to reduce them

2. Explain the difference between a passive and an active motion detector. Include why and where you would use both types of motion detectors

 

Discipline(s)

Telecommunication Technology