Admission to Technology Development and Management (Bachelor of Applied Science) (TMGT-BAS) or Admission to Cybersecurity (Bachelor of Applied Science) (CYSEC-BAS)
Course Description
This course examines threats to computer networks, network vulnerabilities, techniques for strengthening passive defenses, tools for establishing an active network defense, and policies for enhancing forensic analysis of crimes and attacks on computer networks. Topics include private and public key cryptography, digital signatures, secret sharing, security protocols, formal methods for analyzing network security, electronic mail security, firewalls, intrusion detection, internet privacy and public key infrastructure. This course contains foundational coverage in preparing for CompTIA’s CySA+. Students will need additional remediation to ensure success on the exam.
Learning Outcomes and Objectives
Students will prioritize the potential cybersecurity threat environment by:
applying environmental reconnaissance techniques using appropriate tools and processes.
analyzing the results of a network reconnaissance.
implementing or recommending the appropriate response and countermeasure.
explaining the purpose of practices used to secure a corporate environment.
Students will evaluate organizational cybersecurity vulnerability by:
implementing an information security vulnerability management process.
analyzing the output resulting from a vulnerability scan.
comparing and contrasting common vulnerabilities found in various hardware and software targets within an organization.
Students will formulate a suitable cyber incident response by:
distinguishing threat data or behavior to determine the impact of an incident.
preparing a toolkit and using appropriate forensics tools during an investigation.
explaining the importance of communication during the incident response process.
analyzing common symptoms to select the best course of action to support incident response.
summarizing the incident recovery and post-incident response process
Students will appraise organizational security architecture by:
explaining the relationship between frameworks, common policies, controls, and procedures.
recommending remediation of security issues related to identity and access management
reviewing security architecture and making recommendations to implement compensating controls.
using application security best practices while participating in the Software Development Life Cycle (SDLC).
comparing and contrasting the general purpose and reasons for using various cybersecurity tools and technologies.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual course instructors.