CYB 201: Introduction to Cybersecurity and Strategy

Learning Outcomes
At the end of this course, students should be able to:

  1. explain cybersecurity concepts, its methods, elements, and terminologies of cybersecurity
    -cyber, security, threat, attack, defence, and operations;
  2. describe common cyber-attacks and threats, cybersecurity issues, challenges and
    proffered solutions, and build an enhanced view of main actors of cyberspace and cyber
    operations;
  3. apply the techniques for identifying, detecting, and defending against cybersecurity
    threats, attacks and protecting information assets;
  4. explain the impact of cybersecurity on civil and military institutions, privacy, business and
    government applications;
  5. identify the methods and motives of cybersecurity incident perpetrators, and the
    countermeasures employed by organisations and agencies to prevent and detect those
    incidences and software application vulnerabilities; and
  6. state the ethical obligations of security professionals, evaluate cybersecurity and national
    security strategies to the typologies of cyber-attacks that require policy tools and domestic
    response, and define the cybersecurity requirements and strategies evolving in the face
    of big risk.

    Course Contents
    Basic concepts: cyber, security, confidentiality, integrity, availability, authentication, access
    control, non-repudiation and fault-tolerant methodologies for implementing security. Security
    policies, best current practices, testing security, and incident response, Risk management,
    disaster recovery and access control. Basic cryptography and software application
    vulnerabilities. Evolution of cyber-attacks. Operating system protection mechanisms, intrusion
    detection systems, basic formal models of security, cryptography, steganography, network
    and distributed system security, denial of service (and other) attack strategies, worms,
    viruses, transfer of funds/value across networks, electronic voting, secure applications.
    Cybersecurity policy and guidelines. Government regulation of information technology. Main
    actors of cyberspace and cyber operations. Impact of cybersecurity on civil and military
    institutions, privacy, business and government applications; examination of the dimensions of
    networks, protocols, operating systems, and associated applications.

    Methods and motives of cybersecurity incident perpetrators, and the countermeasures employed by organisations and agencies to prevent and detect those incidences. Ethical obligations of security professionals. Trends and development in cybersecurity. Software application vulnerabilities. Evolution of cybersecurity and national security strategies, requirements to the typologies of cyber-attacks that require policy tools and domestic response. Cybersecurity strategies evolving in the face
    of big risk. Role of standards and frameworks.