Abbreviated Course Title: Cyber Security

Catalog Description: This course provides an overview of Cyber Security. It exposes the dimensions of our network, information-based society, reviews the impact of information security on institutions, privacy, business and government risks, the development of legislation and examines the dimensions of networks, protocols, operating systems and associated applications.

Course Prerequisites: (None).

Rationale: This course will provide students with a working knowledge of cyber  security and the significant role it has in the security field. All organizations as well  as individuals must consider the important dimensions of our network, information-based society for their safety. Cyber security also significantly impacts national and  corporate security entities, and never has it been more critical than during the post  September 11, 2001 era.

Students aspiring to advance or seek a career in the security field or law enforcement  should have a thorough understanding of Cyber Security and how it ties in with  National and Corporate Security, as it affects all sectors of our information-based,  technically reliant society.

Student Learning Outcomes and Course Goals: Students who successfully  complete this course will be able to…

A. ANALYZE the many and various responsibilities involved with Cyber Security.

B. APPLY the knowledge learned in developing cyber security policies and procedures.

C. APPRAISE whether or not corporate and national security entities are working  together in the post September 11, 2001 era.

D. ASSESS the vulnerabilities of the many different entities reliant on information  based systems.

E. RECOGNIZE the importance of understanding the potential adverse impact that  breaches/compromises of information systems would have on organizations.

F. DISCUSS and ANALYZE what and how corporate and national security entities  have addressed the need to maintain and continually upgrade their informational  and technological systems.

G. EVALUATE the responsibilities that cyber security professionals have with  respect to protecting information, communications and related hard and software.

H. COMPARE and CONTRAST the levels of and prioritize the potential  vulnerabilities and threats to information-based systems.

I. REFLECT the responsibilities of and importance that executive management has  in fully supporting cyber security professionals in establishing and enforcing  policies and procedures.

Instructional Procedures: 

-Lecture
-Case Studies
-Group discussion and interaction
-Group and individual assignments/projects
-Student presentations

Course Content:  

1. Introduction History, Knowledge Base, Background

2 Information-based Systems Security, Trusted Systems

3 Cyber Systems Protection Defense in depth

4 Design Reference Threat SWOT Analysis

5 Network Protocols Cryptology, authentication, access control, identity management

6 Operating Systems & Associated Applications Anti-virus, anti-spy, firewalls, system backups

7 Effects of Policies and Procedures Policy, Practice, Future Research

8 Mid-term Project/Examination

9 Working With Other Security Sectors Relationship building, sharing resources, staff development

10 Cyber and Corporate Security Copyright and Patent

11 Cyber and National Security United Nation Initiatives, Federal, State

12 Disaster Recovery Contingency Planning

13 Organizational Continuity Planning Procedures, off-site continuity, system redundancy

14 Current Legislation Affecting Info Systems Local, State, National

15 Final Conference

 

* The details above are tentative and subject to change without prior notice at the sole discretion of the university.

 

Leave a Reply

Your email address will not be published. Required fields are marked *