cyb100 | undergraduate
This undergraduate-level course is 5 weeks To enroll, speak with an Enrollment Representative.
topic title goes here
The Importance and Scope of the Cyber Domain
- Describe the importance of understanding the scope of the Cyber Domain.
- Identify important milestones in the development of communication and information technology, and security.
- Identify the high value components of information and communication systems, networks, the cloud, and infrastructure as it relates to commerce, corporations, nations, and societies.
- Describe the maritime, space, and physical domains.
- List important cyber security exploitations, unauthorized use, and modifications of systems, infrastructure, and the cloud.
Legal, Ethical, and Privacy Issues
- Identify the fundamental U.S. laws that impact the Cyber Domain.
- Describe ethics, privacy, and freedom of information in the U.S. and in Key Nations.
- Describe European Union (EU) Directive on Data Privacy and its global influence on internet governance.
- Identify the conflicting data ownership position of U.S. Cloud Service Providers and nation states on data assets domiciled on distributed, non-U.S.-based, cloud physical nodes.
Geopolitics of Cyber Security
- Identify important international laws for cybersecurity.
- Differentiate political stances of nations outside the U.S.
- Describe the impact of global ethical and political elements on U.S. cyber security.
- Identify domestic and international conflicts within the Cyber Domain.
Military Influence in the Cyber Domain
- Identify the differences between military, commercial, and civilian cyber concerns.
- Differentiate between espionage, intelligence gathering, and cyber warfare.
- Describe physical assets in the Cyber Domain.
- Identify the factors that contribute to increasing vulnerability of national infrastructure.
Infrastructure in the Cyber Domain
- Define and describe critical infrastructure protection.
- Summarize industry security certifications applicable to your career.
- Describe the Chief Information Security Officer (CISO) and Chief Information Officer (CIO) roles and responsibilities.
- Identify potential conflicts between the CIO and CISO concerning implementation of best practices.
- Implement personal authentication and secure archival of data on a free Cloud Storage-as-a-Service resource.
Please ask about these special rates:
Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.
Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.