This course provides a comprehensive, integrated and up-to-date overview of computing security. We will examine theoretical concepts that form a foundation for information systems security. The topics include—but are not limited to—cybersecurity overview, cryptographic tools, user authentication, access control, malicious software, denial-of-service attacks, intrusion detection, firewalls and intrusion prevention systems, and buffer overflow. The discussion of these topics will provide students with broad and new perspectives on contemporary issues in cybersecurity. We will also adopt a practical, hands-on approach to examining several fundamental security technologies. This course provides students with an opportunity to advance their critical thinking ability and troubleshooting skills to address cyber threat issues. Basic knowledge of systems, servers, networking and database are preferred.
Learning Objectives
- Demonstrate knowledge of concepts and terminology of information security, and critical issues related to threat and risk.
- Communicate effectively about the importance of information security methodologies, and the challenges they are meant to address.
- Define and explain the basic types of information attacks, malicious software and associated information security principles.
- Employ user-centered design strategies on the utilization of cryptographic tools, user authentication, access control mechanisms.
- Demonstrate the ability to discuss and create security baselines to detect and prevent intrusion.
- Explain the technical, managerial and ethical value of cyber defense teamwork in a collaborative setting.
- Acquire troubleshooting and critical thinking skills and techniques of the tools needed to secure organizations as socio-technical systems.
- Define career opportunities in the information security industry.
Framework Connections
Competency Areas
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.