CSEC-210 Cyber Self Defense

Course Description

This course will examine cyber security from a computer user’s perspective to provide students with a basic understanding of the risks they face, how best to prepare to withstand attacks, and what to do if they are attacked. This course will teach students how to recognize a potential cyber attacker and identify their own vulnerabilities so that they can defend themselves, their information and their identity. Students will also gain insight into the societal, legal, and ethical impact of digital crime. Class 3, Credit 3 (Fall, Spring)

Course Goals

Given the ubiquitous nature of computing and the increase in security-related crimes a basic foundation in cyber security and privacy are a necessary part of a student’s education. The goals of this course include:

  • Raising the information security awareness across all disciplines by providing students with basic skills for identification, prevention, and response to security incidents.
  • Focusing on the interdisciplinary nature of information security and integrating domain knowledge from respective student majors.

Possible Topics

  • History of digital crime
  • Ethics including copyright and codes of conduct
  • Societal issues and impact of cyber crime
  • Security requirements/controls/standards/legislation/policies
  • Your Assets: Real property versus virtual property
  • Understanding Privacy
  • Vulnerabilities Taxonomy
  • Security Threats: defining and classifying digital crimes
  • Adversary Profiles
  • Reconnaissance: what is it and how is it done
  • Malware: what are the different types
  • Identifying Risk and Developing a Security Mindset
  • Social Engineering and Phishing
  • Safe Social Networking
  • Computing System Security
  • Network Security
  • Wireless and Mobile Device Security
  • Defense: Backup and Recovery
  • Incident Response
  • Forensics: investigation, data analysis, evidence collection

Leave a Comment

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

A blog featuring student posts about current topics in Cyber Security

%d bloggers like this: