Content
• Students will demonstrate knowledge of vulnerabilities, protocols, attacks, and defenses through labs and quizzes.
• Students will demonstrate knowledge of current policy, compliance, and risk management through discussions.
• Students will observe lab walkthroughs for real world exposure to defense against common attacks by securing operating systems and user permissions.
Learning objectives
This course will provide an understanding of cybersecurity topics from foundational to intermediate levels. Labs and real-world case studies will reinforce terminology and provoke discussion about professional and ethical issues related to cybersecurity and data governance. Specific topics to be examined include networking protocols, threats, authentication models, cryptography, layer 2 security, application security, social engineering, access control lists, defense in depth, firewalls, risk management, and OS hardening.
Teaching methods
This class will use a combination of lecture and lab walkthroughs for instruction. The instructor will provide all in class learning materials. Quizzes will be used for assessment at the end of each class. Participation in class discussions and LMS discussion boards will be tracked. A comprehensive final of roughly 70 questions will be given in class on the final day.