Course level: Undergraduate
This course explores the evolution from information security to cyber security, policy and cyber security development, and the relationships between business and public- or private-sector organizations in meeting the challenges of cyber security threats. Students will be introduced to the legal and regulatory requirements for internal network and Internet security as they apply to both business and personal use. Vulnerabilities of both the organization and the individual will be reviewed as well as the processes and controls for mitigating cyber security threats. The need for an IT audit will also be explored as part of the vulnerability or mitigation process as well as the need for development of an organization-wide cyber security policy.
What you'll learn
What you’ll learn
- Illustrate the key milestones in the history of information security to cyber policy and development.
- Differentiate enterprise security and cybersecurity.
- Identify strategies to determine an organization’s current security environment.
- Identify the common categories of cybersecurity threats to both private and public organizations.
- Summarize five challenges that both mobile and cloud computing contribute to safe computing.
- Explain the importance of testing in detection and intrusion risk reduction in the cyber environment.
- Analyze the relationship between security system development lifecycle (SSDL) and threat modeling.
- Determine the major components of contingency planning.
- Identify three network security strategies to build a defensible network.
- Outline the steps involved with a positive incidence response to an intrusion.
- Summarize how identifying and assessing risk can lead to prevention.
- Examine the value to the company of an IT security audit.
- List the key components of an IT security audit.
- List the responsibilities of employees in an organization’s cybersecurity plan.
- Summarize strategies for securing web communications.
- Create cybersecurity awareness materials for employees and management of an organization.
- Summarize the legal and ethical issues of cybersecurity.
- Outline a security policy mission statement.
- Examine regulations and legislation constraints that apply to cybersecurity.