IT&C 101
Download as PDF
Introduction to Cybersecurity
Electrical and Computer Engineering
Ira A. Fulton College of Engineering
Course Description
Planning and preparing for a successful career in Cybersecurity. Developing foundational skills with computers, networks, web systems, encryption, cybersecurity terminology, databases, and technical problem solving.
When Taught
Fall and Winter
Min
3
Fixed/Max
3
Fixed
2
Fixed
2
Title
Cybersecurity careers and related disciplines
Learning Outcome
Describe the differences among computing disciplines and their relationship to cybersecurity careers.
Title
Networking Fundamentals
Learning Outcome
Compare different types of computer networks (e.g., wireless; ethernet), their advantages and disadvantages, and how network layers and packets work
Title
Computer Hardware
Learning Outcome
List the components of a computer and how they work together including microprocessor, storage, and input/output
Title
Operating Systems
Learning Outcome
Compare and contrast operating systems and interact with one via the command line (e.g., Linux)
Title
Data Representation and Databases
Learning Outcome
Convert between different types of data representation (e.g., binary, ASCII, hexidecimal) and interact with a database using a structured query language (e.g., SQL)
Title
Web and Cloud Systems
Learning Outcome
Identify web technologies (e.g., HTML, CSS, Javascript) and cloud services and architectures and describe how they relate to each other
Title
Usable and Secure Computing
Learning Outcome
Describe the relationship between security and usability and the concept of security by design
Title
Encryption
Learning Outcome
Describe how symmetric encryption, asymmetric encryption, and hashes are used to provide security services
Title
Research and Evaluation
Learning Outcome
Identify credible sources of cybersecurity information and describe how to search and evaluate information found on the Internet and in the library
Title
Cybersecurity Fundamentals
Learning Outcome
Apply cybersecurity fundamental terminology (e.g., risk, vulnerabilities, security controls, CIA triad) to describe security weaknesses, attacks, and defenses in multiple cybersecurity contexts