CSEC-101 Fundamentals of Computing Security

Course Description, Goals, and Topics

Course Description

This course provides an introduction to the fundamental issues, concepts and tools common to all areas of computing security. Topics include identifying attackers and their motivations. Essential techniques will be introduced covering the areas of anti-virus, monitoring, virtual machines, account control, and access rights management. Various security models will be investigated. Concept areas such as confidentiality, Integrity, availability and privacy will be studied. (Prerequisites: None)

Course Goals

To establish a foundation in basic cyber security. The goals of this course include:

  • Identify the risks associated with computer use.
  • Describe the potential computer violations that may occur and the attackers.
  • Describe the methods used in doing reconnaissance against a computer system or network.
  • Explain the financial impact and risks associated with cyber crime. Assessed in an exam.
  • Describe how to prepare and defend against cyber crimes and information theft.
  • Explain the appropriate response should a cyber crime occur.
  • Examine the effects of poor security on an organization or individual.
  • Examine the various roles of a consumer, user, employee, employer, service provider (ISP) and the government in providing a secure computing/networking environment.

Possible Topics

  • Ethics
  • Assets
  • Vulnerabilities
  • Privacy
  • Threats
  • Reconnaissance
  • Risk
  • Defense
  • Response
  • Data Sanitization

Leave a Comment

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

A blog featuring student posts about current topics in Cyber Security

%d bloggers like this: