IT&C 101

Download as PDF

Introduction to Cybersecurity

Electrical and Computer Engineering Ira A. Fulton College of Engineering

Course Description

Planning and preparing for a successful career in Cybersecurity. Developing foundational skills with computers, networks, web systems, encryption, cybersecurity terminology, databases, and technical problem solving.

When Taught

Fall and Winter

Min

3

Fixed/Max

3

Fixed

2

Fixed

2

Title

Cybersecurity careers and related disciplines

Learning Outcome

Describe the differences among computing disciplines and their relationship to cybersecurity careers.

Title

Networking Fundamentals

Learning Outcome

Compare different types of computer networks (e.g., wireless; ethernet), their advantages and disadvantages, and how network layers and packets work

Title

Computer Hardware

Learning Outcome

List the components of a computer and how they work together including microprocessor, storage, and input/output

Title

Operating Systems

Learning Outcome

Compare and contrast operating systems and interact with one via the command line (e.g., Linux)

Title

Data Representation and Databases

Learning Outcome

Convert between different types of data representation (e.g., binary, ASCII, hexidecimal) and interact with a database using a structured query language (e.g., SQL)

Title

Web and Cloud Systems

Learning Outcome

Identify web technologies (e.g., HTML, CSS, Javascript) and cloud services and architectures and describe how they relate to each other

Title

Usable and Secure Computing

Learning Outcome

Describe the relationship between security and usability and the concept of security by design

Title

Encryption

Learning Outcome

Describe how symmetric encryption, asymmetric encryption, and hashes are used to provide security services

Title

Research and Evaluation

Learning Outcome

Identify credible sources of cybersecurity information and describe how to search and evaluate information found on the Internet and in the library

Title

Cybersecurity Fundamentals

Learning Outcome

Apply cybersecurity fundamental terminology (e.g., risk, vulnerabilities, security controls, CIA triad) to describe security weaknesses, attacks, and defenses in multiple cybersecurity contexts