Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a full operational security system in a follow-course.
Upon successful completion of this course, students will be able to:
- Describe foundational concepts in cybersecurity.
- Apply access control and scripting techniques.
- Design and implement secure architechtures.
- Integrate physical and environmental security measures.
- Secure telecommunications and network systems.
- Implement cryptographic solutions.
- Develop business continuity and disaster recovery plans.
- Navigate legal, regulatory, and compliance requirements.
Overview
Syllabus
- Module 1: Introduction to Cyber Security
- Welcome to Cyber Security Technologies! This module offers a comprehensive foundation for understanding the dynamic field of cyber security. Students will explore various career pathways within cyber security, gaining insights into the roles, responsibilities, and skills required. This module also delves into current trends affecting the cyber landscape and provides an overview of information security principles, including risk management strategies. Through this exploration, studnets will be equipped with the knowledge to navigate and contribute to the field of cyber security effectively.
- Module 2: Access Control and Scripting
- In Module 2, learners will delve into the core principles of access control, understanding how proper implementation can strengthen system security. This module includes creating basic Bash scripts, offering practical skills for system administration tasks. Additionally, students will learn to apply the guidelines of the NIST Special Publication 800 Series, ensuring compliance with industry-standard security practices. This module is designed to equip learners with the technical expertise for managing access control and enhancing security through scripting and regulatory frameworks.
- Module 3: Security Architecture and Design
- Module 3 provides an in-depth look at the foundational elements that make up security architecture, enabling learners to evaluate the structure and behavior of secure systems. Students will also assess the effectiveness of the NIST 800-53 security controls, gaining the ability to apply these guidelines to protect information systems. Additionally, this module covers the unique security considerations inherent in virtualization technology, offering insights into how to maintain robust security in increasingly virtualized environments. This module provides students with the evaluative skills necessary to design and critique security architectures within a variety of technological contexts.
- Module 4: Physical and Environmental Security
- Module 4 offers a deep dive into the critical, often overlooked aspects of security that go beyond the digital realm. Learners will acquire the knowledge to apply fundamental physical security measures, understanding the vital role these play in comprehensive security strategy. This module also explores the environmental factors that impact security, from natural disasters to climate control, and evaluates the technologies — from biometrics to surveillance systems — that are employed to enhance physical security measures. Through this module, students will be equipped to assess and improve the physical and environmental security aspects of various organizations.
- Module 5: Telecommunications and Network Security
- Module 5 provides an essential exploration of the strategies and tools necessary for protecting both private and enterprise networks. Students will delve into the basics of network security, gaining the skills to analyze vulnerabilities and implement effective security measures. This module further details the intricacies of securing telecommunications systems, including an evaluation of various network security protocols, ensuring that learners are prepared to address the challenges presented by the diverse array of communication technologies in use today.
- Module 6: Cryptography and Cryptographic Applications
- Module 6 demystifies the complex world of cryptography, providing learners with a clear understanding of its fundamental principles and the pivotal role it plays in securing information. Students will critically evaluate various cryptographic algorithms, from classic ciphers to cutting-edge public-key cryptosystems, to understand their applications and limitations. This module provides opportunities to create practical applications of cryptography, giving learners valuable experience in employing cryptographic techniques to real-world security challenges.
- Module 7: Business Continuity and Disaster Recovery
- Module 7 equips learners with the skills to ensure that organizations can continue operating in the face of disruptions and quickly recover from any form of disaster. Through detailed exploration, students will grasp the core principles of business continuity planning and delve into analyzing various disaster recovery strategies, understanding their applicability and effectiveness. Additionally, this module offers a deep dive into the critical processes of risk assessment and management, enabling learners to identify potential threats and devise operational responses that minimize impact and facilitate swift recovery.
- Module 8: Legal, Regulations, Compliance, and Investigations
- Module 8 offers an in-depth look at the complex landscape of laws and regulations shaping the cybersecurity domain. Students will explore a wide spectrum of legal and regulatory issues, gaining an understanding of how these frameworks impact both individuals and organizations in the field of cybersecurity. Moreover, this module dives into the analysis of different compliance frameworks, equipping learners with the knowledge to navigate and adhere to various global and regional regulations, thereby ensuring that cybersecurity practices meet legal obligations and industry standards.
- Summative Course Assessment
- This module contains the summative course assessment that has been designed to evaluate your understanding of the course material and assess your ability to apply the knowledge you have acquired throughout the course.
Taught by
Maurice E. Dawson