CYBV301 - Fundamentals of Cybersecurity

CYBV301
Fundamentals of Cybersecurity

Bachelor's Degrees

Cyber Engineering Cyber Law & Policy Defense & Forensics

Certificates

Cyber Defense Cybersecurity Digital Forensics Information Warfare Security Computing

Course Description

CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice cybersecurity techniques and procedures.

Learning Outcomes

The student will:

  • Define and explain the Vulnerability-Threat-Control Paradigm.
  • Identify and describe the Confidentiality-Integrity-Availability (C-I-A) security triad.
  • Identify and describe the types of malware, how malware spreads, and how to mitigate its effects.
  • Identify and describe the types of networks to include LAN, WAN, MAN, PAN, NAN, WLAN, and the Internet.
  • Describe and explain the capabilities, characteristics and limitations of network hardware devices.
  • Identify and explain how to design basic network architectures.
  • Identify and describe the concepts and best practices of a Defense in Depth strategy.
  • Identify and explain the similarities and differences between the OSI & the TCP/IP Model.
  • Identify and describe the basic functions, uses, and characteristics of network protocols.
  • Identify and describe the history and fundamentals of cryptography. o Identify and describe the different types of cyber attacks.
  • Describe and explain the active cyber defense cycle’s techniques and mitigation strategies.
  • Identify and explain the major U.S, and International laws governing cyberspace, the restrictions they place on cyber operations, and how they can impact an organizations overall defensive strategy.

Course Objectives

The student will:

  • Define and explain the Vulnerability-Threat-Control Paradigm.
  • Identify and describe the Confidentiality-Integrity-Availability (C-I-A) security triad
  • Identify and describe the types of malware, how malware spreads, and how to mitigate its effects
  • Identify and describe the types of networks to include LAN, WAN, MAN, PAN, NAN, WLAN, and the Internet.
  • Describe and explain the capabilities, characteristics and limitations of network hardware devices
  • Identify and explain how to design basic network architectures.
  • Identify and describe the concepts and best practices of a Defense in Depth strategy
  • Identify and explain the similarities and differences between the OSI & the TCP/IP Model
  • Identify and describe the basic functions, uses, and characteristics of network protocols
  • Identify and describe the history and fundamentals of cryptography.
  • Identify and describe the different types of cyber attacks
  • Describe and explain the active cyber defense cycle’s techniques and mitigation strategies
  • Identify and explain the major U.S, and International laws governing cyberspace, the restrictions they place on cyber operations, and how they can impact an organizations overall defensive strategy.
  • WiFi Access Points