Rouse Company Foundation Student Services Building

CMSY 176 Cybersecurity Fundamentals and Practice

Previously CMSY 162. This course is designed to introduce students to the fundamentals of network security in preparation for advanced courses. It will give students a solid foundation for understanding different security technologies and how they function. Students will learn to identify the fundamental principles of cybersecurity and how to identify attacks and appropriate security measures. This course prepares students for the CompTIA Security+ exam.

Credits

3

Hours Weekly

2 hours lecture, 2 hours lab

Course Objectives

  1. Describe attacks and threat actors.
  2. Identify and illustrate the fundamental principles in protecting data.
  3. Identify and manage security measures for common system architectures.
  4. Identify, analyze, and respond to malicious activity.
  5. Describe the different types of network, application, and system attacks.
  6. Describe how security controls apply to different architecture models
  7. Describe cryptography and cryptographic algorithms to secure information.
  8. Summarize the elements of security management and oversight
  9. Describe authentication, authorization, and account management.
  10. Explain vulnerability assessment and data security.

Course Objectives

  1. Describe attacks and threat actors.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab rubric
  2. Identify and illustrate the fundamental principles in protecting data.

    Learning Activity Artifact

    • Writing Assignments

    Program Goal(s)

    Degree: Cybersecurity - A.A. Degree (Transfer)

    Determine the role of network security technologies within a network and establish appropriate security policy.

  3. Identify and manage security measures for common system architectures.

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab rubric

    Program Goal(s)

    Degree: Cybersecurity - A.A. Degree (Transfer)

    Determine the role of network security technologies within a network and establish appropriate security policy.

  4. Identify, analyze, and respond to malicious activity.

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab rubric

    Program Goal(s)

    Degree: Cybersecurity - A.A. Degree (Transfer)

    Identify appropriate network security tools and technologies to establish and configure a secure computer network.

  5. Describe the different types of network, application, and system attacks.

    Procedure for Assessing Student Learning

    • Other (please fill out box below)

    Program Goal(s)

    Degree: Cybersecurity - A.A. Degree (Transfer)

    Utilize software tools, devices, and procedures to determine if current systems meet the security policy requirements and problem-solve network vulnerabilities and cyber-attacks to harden network infrastructure.

  6. Describe how security controls apply to different architecture models

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab rubric
  7. Describe cryptography and cryptographic algorithms to secure information.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab rubric
  8. Summarize the elements of security management and oversight

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Quiz

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Quiz rubrics
  9. Describe authentication, authorization, and account management.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Quiz

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Quiz rubrics
  10. Explain vulnerability assessment and data security.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Writing Assignments
    • Capstone project

    Procedure for Assessing Student Learning

    • Other (please fill out box below)