1. Education
  2. Courseware

Cultivating a Security Sensitive Culture

Based on the results of the gap analysis performed, the UHCL Cybercorps Project team has proposed a progressive solution in which all the needed courseware can be designed, implemented, and integrated. The general approach is to utilize existing resources (both internal and external) as much as possible to reduce cost and implementation time. Within the scope of this proposal, the courseware to be developed are listed and prioritized as below.

Proposed Courseware

Proposed Courses Covered KUs and Related Topics Hands-on Exercises/Labs Priority
New Course: Cyber Attacks and Defense Cyber Threats (Module #1)
Fundamental Security Design Principles*
Cyber Defense (Module #2)
Introduction to Cryptography*
Yes High
New Course: Network Defense Threats to Networks*
Network Security (Module #3)
Network Security Policies and Development Process*
Advanced Network Security Protocols*
Yes High
New Course: Network Forensics Introduction to Network Forensics (Module 4)
Network Forensics Tools*
Legal Issues in Network Forensics*
Privacy and Network Security*
Yes Medium

Learning Outcomes

The learning outcomes to be achieved from the proposed new courseware are summarized as below:

Courseware Learning Outcomes
Introduction to Cybersecurity
  • Describe potential system attacks and the actors that might perform them.
  • Describe cyber defense tools, methods and components.
  • Apply cyber defense methods to prepare a system to repel attacks.
  • Describe appropriate measures to be taken should a system is compromised.
  • Identify the bad actors in cyberspace; compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  • Describe different types of attacks and their characteristics.
  • List the first principles of security.
  • Describe principles of security.
  • Analyze common security failures and identify specific design principles that have been violated.
  • Identify the needed design principle when given a specific scenario.
  • Describe the basics of cryptography and control mechanisms.
  • Network Security • Describe the various concepts in network defense.
    • Apply network security knowledge to implement network defense measures.
    • Use a network monitoring tool.
    • Use a network mapping tool.
    • Describe the functions of a given network security appliance.
    Network Forensics • Describe the methodologies used in network forensics.
    • Analyze and decipher network traffic.
    • Identify anomalous or malicious activities.
    • Provide a summary of the effects of malicious activities on the system.
    Database Security (as a new module in the Design of Database course) • Describe common security models of database management systems.
    •Identify and describe common security concerns in database management systems.
    • Apply security principles to the design and development of database systems and database structures.