Cyber Attacks and Defense
Course Objectives and Learning Outcomes
This course serves as the first cybersecurity class for Computer Science undergraduate students. It introduces the basics of cyber attacks and cyber defense mechanisms, with an emphasis on cyber operations. This course introduces what cybersecurity entails in organizational and enterprise settings, plus other non-technical factors in securing the cyberspace. The overall objective is to help our future computing professionals develop essential understanding of the fundamental concepts underlying cybersecurity. In addition, the understanding will be augmented through multiple hands-on/programming activities, which enhance the understanding by allowing students to see security-in-action. The course is designed in modular fashion so that elements of the courseware could be plugged in other instructional efforts. Upon completion of the course, students will be able to:
View Syllabus of Cyber Attacks and Defense Course
Modules | Submodules | Units Included |
---|---|---|
Security Fundamentals | Security Concepts and Principles Security Management The Cybersecurity Profession and Careers |
Security Concepts, Security Design Principles, Security Models, Frameworks, Guidelines and Policies, Security Controls/Practice, Risk Management, Non-technical Security Related Issues, Cybersecurity as a Profession, Building up your skills |
Security Threats and Countermeasures | Security Threats Introduction to Cryptography |
Attack Vector, Attack Surface, Cyber Crimes, Common Cryptographics basics/uses, Applications of Cryptography and PKI |
Network Security | Networking Basics Network Security Basics Network Defense Basics Wireless Security |
OSI, TCP/IP Models, Network Architecture and Topologies, Common Network Devices, Network Security Issues/Attacks, Firewall/IDS/IPS Basics, Wireless Networking Basics, Wireless Security Protocols |
Software Security | System Security Low-level Attacks and Defense Secure Programming Web-based System Security |
OS Security, File System Security, Lower-level attacks, exploits and defense, Security Requirements, Defensive Programming, Secure Programming Practice, Web Application Technologies, Web Application Vulnerabilities and Attacks, Secure Web-based systems |
Cloud Security | Cloud Computing Fundamentals Cloud Security |
Virtualization, Cloud Services, Cloud Deployment Models, Cloud Architecture, CLoud Security Threats, Cloud Security Measures, IoT and Security |