Cybersecurity is a course that provides an overview of Information Security and Assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures with emphasis on practical aspects of Information Security. Topics include: security principles, threats, attacks, security models, security policies, overview of authentication, encryption, and certifications, security detection, security in Unix and Windows environments, business risk analysis, protection of information assets, examination of pre- and post-incident procedures, and an overview of the information security evaluation.
After completing Cybersecurity, students will be equipped with a basic understanding of the following:
- What is cybersecurity?
- What are the threats?
- How to identify vulnerabilities?
- What is the cyber landscape?
- What are the models and tools that can be used?
- What are the associated cyber operations?
Prior general IT experience is recommended.
Students will be assigned 5 homework assignments, and 1 final exam for each course.
Module 1: Introduction to Cyber Security
- Nature of the risks and liabilities within the cyber environment
- The potential consequences of a cyber attack.
- The importance of Information Technology (IT) systems
- The national policy regarding cyber security and cyber terrorism
- Risks and consequences associated with IT systems
Module 2: Determining the Threat Environment
- Nature of the existing threat environment
- Threat elements that seek to gain unauthorized access to the network.
- Major cyber threat attack modes
Module 3: Identifying System Vulnerabilities
- Network vulnerabilities
- Susceptibility to compromise from threat elements.
- Importance of identifying cyber system vulnerabilities
- Server configuration vulnerabilities
- Application vulnerabilities
- Firewall configuration vulnerabilities
- System control and data system acquisition (SCADA) vulnerabilities
- Cell phone vulnerabilities
- Wireless access point vulnerabilities
- Use of Basic Packet Capture
- Use of network management protocols in identifying and resolving IT network vulnerabilities
- Use of encryption in network security solutions
Module 4: The Cyber Battlefield
- Digital Data
- The Physical Computer
- PC Vivisection
- Operating Systems
- Web: Servers, browsers and HTML
- Web: Build your webpage
- Web: Client Side Scripting: non-event driven, event driven, forms
- Web: Server Side Scripting
- Web: Injection attacks & XSS
- Networks, Protocols, the Internet:
- Networks: LAN
- Networks: Wireless
Module 5: Models and Tools
- Information Assurance
- Symmetric Encryption
- Digital Cryptography
- Asymmetric Cryptography
Module 6: Cyber Operations
- Phases of a cyber attack
- Network Attack
- Network Defense
- Case Studies
This course is Instructor-led and delivered through our award-winning online Learning Management System.