CYSE 300

Introduction to Cybersecurity

This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.

The course objectives are:

  • Identify and prioritize information assets;
  • Identify and prioritize threats to information assets;
  • Define an information security strategy and architecture;
  • Plan for and respond to intruders in an information system;
  • Describe legal and public relations implications of security and privacy issues; and
  • Present a disaster recovery plan for recovery of information assets after an incident.

Course Material

Please provide a brief overview of your work within this course, explaining how you engaged with the above learning outcomes. You will want to include examples of your assignments that demonstrate your practice with these concepts, explaining what you did and how it helped you learn. You may include embedded versions of your material, pictures, audio explaining your work, a video, so on (Tutorials: Adding and Embedding Media, Plugin: Simple YouTube Embed, More). Remember that you are trying to convince an unfamiliar audience that you 1) have working knowledge of these concepts 2) can demonstrate your skill in relation to these concepts 3) they want to spend time learning more about your knowledge and skills. Finally, you will want to indicate how you can use this knowledge in the future, specifically within your chosen discipline.

The course contains ten cybersecurity laboratory assignments and a research paper. Please include the research paper and a few of the laboratory reports you generated for the class. The laboratory reports should contain the required artifacts illustrating the successful completion of cybersecurity-related activities. They should be formatted and written in a professional manner as if you were submitting them to executives in an organization.

The cybersecurity laboratories include the following:

  • Performing reconnaissance and probing using common tools;
  • Performing a vulnerability assessment;
  • Enabling Windows Active Directory and user access controls;
  • Using group policy objects and Microsoft Baseline Security Analyzer for change control;
  • Performing packet capture and traffic analysis;
  • Implementing a business continuity plan;
  • Using encryption to enhance confidentiality and integrity;
  • Performing a website and database attack by exploiting identified vulnerabilities;
  • Eliminating threats with a layered security approach; and
  • Implementing an information systems security policy.

Be sure to remove this instructional language when you have completed updating content on this page.