CYB-106 Introduction to Cybersecurity

3 Credit hours - 1 Lecture, 2 Lab

Prerequisite(s): None

Course Rationale:

The rapidly increasing interconnected world we live and operate in is constantly under attack. Information Technology demands securing devices, systems, applications, infrastructure, and data. From an introductory perspective, technicians need to know what cybersecurity is, how it is accomplished and implemented through various layers, as well as how a lack of cybersecurity preparedness can impact individuals and organizations – often leading to network infiltration and system breaches. Whether you are a user or a security professional in the making, an understanding of cybercrime, security principles, technologies, and procedures used to defend against a growing threat landscape is necessary to protect and defend.

Catalog Description:

This course provides the student with a thorough understanding of how to identify what needs to be protected, how to protect it, and how to identify threats against the digital resource's individuals and organizations value. A basic understanding of the cybersecurity landscape will be explored to guide the student into the knowledge and understanding necessary to accomplish privacy, security, and defense, spanning from the end user to the data-intensive enterprise networks and systems. The demand for cybersecurity professionals continues to grow; this introductory cybersecurity course will offer insight to the world of securing information whether you want to pursue an entry-level networking or security professional position.

Course Objectives

  1. Define what cybersecurity is and its potential impact on modern networks.

  2. Understand the most common threats, attacks and vulnerabilities.

  3. Gain insights for how businesses protect their operations from attacks.

  4. Discover occupational trends and why cybersecurity opportunities continue to grow.

  5. Understand security controls for networks, servers and applications.

  6. Develop valuable security principals and how to develop compliant policies.

  7. Implement proper procedures for data confidentiality, integrity, and availability.

  8. Develop critical thinking and problem-solving skills using real and virtual equipment.

Core Outcomes

Test Out Requirements

Last updated