Cultivating a Security Sensitive Culture
Based on the results of the gap analysis performed, the UHCL Cybercorps Project team has proposed a progressive solution in which all the needed courseware can be designed, implemented, and integrated. The general approach is to utilize existing resources (both internal and external) as much as possible to reduce cost and implementation time. Within the scope of this proposal, the courseware to be developed are listed and prioritized as below.
Proposed Courseware
Proposed Courses | Covered KUs and Related Topics | Hands-on Exercises/Labs | Priority |
---|---|---|---|
New Course: Cyber Attacks and Defense | Cyber Threats (Module #1) Fundamental Security Design Principles* Cyber Defense (Module #2) Introduction to Cryptography* |
Yes | High |
New Course: Network Defense | Threats to Networks* Network Security (Module #3) Network Security Policies and Development Process* Advanced Network Security Protocols* |
Yes | High |
New Course: Network Forensics | Introduction to Network Forensics (Module 4) Network Forensics Tools* Legal Issues in Network Forensics* Privacy and Network Security* |
Yes | Medium |
Learning Outcomes
The learning outcomes to be achieved from the proposed new courseware are summarized as below:
Courseware | Learning Outcomes |
---|---|
Introduction to Cybersecurity | |
Network Security | • Describe the various concepts in network defense. • Apply network security knowledge to implement network defense measures. • Use a network monitoring tool. • Use a network mapping tool. • Describe the functions of a given network security appliance. |
Network Forensics | • Describe the methodologies used in network forensics. • Analyze and decipher network traffic. • Identify anomalous or malicious activities. • Provide a summary of the effects of malicious activities on the system. |
Database Security (as a new module in the Design of Database course) | • Describe common security models of database management systems. •Identify and describe common security concerns in database management systems. • Apply security principles to the design and development of database systems and database structures. |