cyb100 | undergraduate

Cyber Domain

Explore by:

or call us at

About:

About:

This course defines the Cyber Domain that encompasses Cybersecurity as the discipline of securing computer information and communications systems, networks, infrastructures and assets, and protecting them against damage, unauthorized use, modification, or exploitation. The Cyber Domain must be managed ethically, politically, and physically in a similar collaborative fashion to the space, maritime, and physical domains of states and nations globally.

This undergraduate-level course is 5 weeks To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5 weeks

topic title goes here

    Security Technology, Cryptography, and Physical Security in the Cyber Domain

    • Describe the categories and models of intrusion detection and prevention systems.
    • Identify physical asset controls in space, maritime, and physical domains of states and nations globally.
    • Explain the basic principles of cryptography in securing communications.

    Infrastructure and Roles in the Cyber Domain

    • Describe the responsibilities of the Chief Information Security Officer (CISO) and Chief Information Officer (CIO) roles.
    • Summarize industry security certifications applicable to your career.
    • Explain the roles involved in critical infrastructure protection.

    The Importance and Scope of the Cyber Domain

    • Discuss the importance of understanding the scope of the cyber domain.
    • Identify the key components of an information system and how it relates to the cyber domain.
    • Explain multiple approaches to information security implementation.
    • Summarize the systems development life cycle.
    • List the components of the threat environment.

    Legal, Ethical, and Privacy Issues with the Cyber Domain

    • Identify the fundamental U.S. laws that impact the cyber domain.
    • Discuss compliance laws and regulations.
    • Examine organizational security issues.
    • Explain the role of security technology in upholding privacy laws and ethics in information security.

    Security Planning and Risk Management Methods

    • Explain how important roles in security planning relate to the cyber domain.
    • Express the importance of risk management in cybersecurity.
    • Outline steps involved in cybersecurity planning.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.