Minor in Cybersecurity
Cybercrime is increasing as more and more people go online for their daily activities. The minor program in Cybersecurity introduces the students to the different attacks that can happen over the network, and the different techniques and tools to protect against these threats. The program emphasizes skills development in identifying security risks and developing strategies to protect the system and data from cyber attacks using appropriate tools.
Program Outcomes
By the end of the program, learners will be able to:
- Identify security risks present in an organization’s information systems
- Apply industry best practices and tools for the protection of systems and data
- Effectively document the vulnerabilities and prevention recommendations in reports
Course List
Introduction to Computing (CCICOMP) | 3 units |
Introduction to Networks – Lecture (ITNET01) | 3 units |
Introduction to Networks – Laboratory (LBYITN1) | 1 unit |
Introduction to Security (NSSECU1) | 3 units |
Advanced and Offensive Security (NSSECU2) | 3 units |
Total | 13 units |
Course Details
Introduction to Computing (CCICOMP)
This course provides an introduction to the ICT industry and an understanding of how a computer works. Hands-on laboratory activities will teach the students how to assembly a computer, install an operating system, solve basic hardware and software issues, and connect the computer to the Internet.
By the end of the course, learners should be able to:
- Understand the breadth of the ICT industry,professional ethics and core values
- Build knowledge in the key areas of computing that includes information processing, hardware and software components of computer systems, databases, programming languages and program development, the Internet and security
- Develop skills in assembling a computer, installing operating systems, troubleshooting basic computer problems, connecting the computer to the Internet, and configuring it with basic security measures using actual equipment and tools
Introduction to Networks (ITNET01 and LBYITN1)
This course covers the fundamentals of networking concepts and technologies. It introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for succeeding computer networking courses. By the end of the course, students will have the ability to understand data networking using concepts learned throughout the course, as well as to plan small networks across a range of applications. Fundamental understanding and comprehension shall be developed through reading, assignments, and classroom discussion; while critical thinking and technical skills shall be developed though supplemental hands-on activities in a laboratory co-component that should be enrolled simultaneously with the lecture component.
By the end of the course, learners should be able to:
- Apply knowledge of network media, devices, protocols and services considering their functionality, advantages and limitations to conceptualize solution models for computer communication requirements
- Design, implement, and troubleshoot a simple Ethernet network based on required specifications exhibiting usage of correct addressing schemes and networking devices
- Comprehend written instructions to complete a laboratory activity
- Source knowledge independently to accomplish tasks
Introduction to Security (NSSECU1)
This course provides an introduction to concepts and applications in computer security. Mainly focusing on lectures and practical discussions on the principles of secure design and different aspects of computer security from data, access, host, network, and enterprise. Security policies and management would also be discussed together with issues on ethics as well as legal concerns. This course serves as a foundation for future courses that would involve concepts in computer security. The main output of the course is to create a security survey in order to better understand the process of determining threats and risks to the different elements of a computer system.
By the end of the course, learners should be able to:
- Design a security survey and a security awareness campaign in order to better understand the risks and implications from a security standpoint of an organization
- Use and test various techniques and strategies of good security practices for the protection of the confidentiality, integrity, and availability of information
- Pursue knowledge in various domains of the cyber security field
Advanced and Offensive Security (NSSECU2)
This course provides an introduction to the ethical method of proving computer system vulnerabilities and providing countermeasures to mitigate them. The course covers topics on reconnaissance, scanning, enumeration, system hacking, trojan and backdoors, sniffers, denial of service, web application hacking, and others. Lectures and demonstrations would allow students to understand different vulnerabilities that may exist in computer systems, network, and software. Hands-on laboratory would allow students to implement topics discussed in a control environment in order to fully understand the effect of each hacking technique as well as to provide a venue for students to exchange ideas with each other.
By the end of the course, learners should be able to:
- Use knowledge of vulnerabilities in computer systems, networks, and software to design and implement penetration testing techniques
- Perform penetration testing following ethical methods using existing offensive and security applications to determine system and network vulnerabilities
- Modify and develop software utilities that can be used for information gathering or penetration testing
- Effectively document findings and reports of a penetration test for proper reporting
Schedule of Course Offerings
Term 1
- Introduction to Computing
Term 3
- Introduction to Networks – Lecture
- Introduction to Networks – Laboratory
Term 2
- Introduction to Security
Term 1
- Advanced and Offensive Security