CMSY 176 Cybersecurity Fundamentals and Practice
Previously CMSY 162. This course is designed to introduce students to the fundamentals of network security in preparation for advanced courses. It will give students a solid foundation for understanding different security technologies and how they function. Students will also be able to design a basic network with the proper network security structures in place. This course is designed as an entry-level Cybersecurity course, but it is highly recommended that students have a background in computer and network administration. After taking this course, students should be prepared to take the CompTIA Security+ exam. A good understanding of the Windows and Linux operating systems, and TCP/IP protocol, or an extensive background in network administration is highly recommended.
Hours Weekly
2 hours lecture, 2 hours lab
Course Objectives
- Describe attacks, threat actors, information security, and its challenges.
- Identify and illustrate the fundamental principles in protecting data.
- Describe how security controls relate to TCP/IP and OSI models of network protocols.
- Identify security vulnerabilities of TCP/IP protocols and countermeasures to protect networks.
- Describe the different types of network, application, and system attacks.
- Design a basic network, implement and manage with security structures properly in place.
- Describe cryptography and cryptographic algorithms to secure information.
- Explain wireless and mobile device security.
- Describe authentication, authorization, and account management.
- Explain vulnerability assessment and data security.
Course Objectives
- Describe attacks, threat actors, information security, and its challenges.
This objective is a course Goal Only
Learning Activity Artifact
- Other (please fill out box below)
- Capstone project
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Capstone project rubric
- Identify and illustrate the fundamental principles in protecting data.
Program Goal(s)
Degree: Cybersecurity - A.A. Degree (Transfer)
Determine the role of network security technologies within a network and establish appropriate security policy.
- Describe how security controls relate to TCP/IP and OSI models of network protocols.
Program Goal(s)
Degree: Cybersecurity - A.A. Degree (Transfer)
Determine the role of network security technologies within a network and establish appropriate security policy.
- Identify security vulnerabilities of TCP/IP protocols and countermeasures to protect networks.
Program Goal(s)
Degree: Cybersecurity - A.A. Degree (Transfer)
Identify appropriate network security tools and technologies to establish and configure a secure computer network.
- Describe the different types of network, application, and system attacks.
Program Goal(s)
Degree: Cybersecurity - A.A. Degree (Transfer)
Utilize software tools, devices, and procedures to determine if current systems meet the security policy requirements and problem-solve network vulnerabilities and cyber-attacks to harden network infrastructure.
- Design a basic network, implement and manage with security structures properly in place.
This objective is a course Goal Only
Learning Activity Artifact
- Other (please fill out box below)
- Capstone project
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Capstone project rubrics
- Describe cryptography and cryptographic algorithms to secure information.
This objective is a course Goal Only
Learning Activity Artifact
- Other (please fill out box below)
- Capstone project
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Capstone project rubrics
- Explain wireless and mobile device security.
This objective is a course Goal Only
Learning Activity Artifact
- Other (please fill out box below)
- Quiz
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Quiz rubrics
- Describe authentication, authorization, and account management.
This objective is a course Goal Only
Learning Activity Artifact
- Other (please fill out box below)
- Quiz
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Quiz rubrics
- Explain vulnerability assessment and data security.
This objective is a course Goal Only
Learning Activity Artifact
- Other (please fill out box below)
- Capstone project
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Capstone project rubrics