Cybersecurity Part 1 - Fall 2023-1-1
docx
keyboard_arrow_up
School
Virginia Tech *
*We aren’t endorsed by this school
Course
4474
Subject
Industrial Engineering
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by Hendog6969
IST 588 – Intermediate Cybersecurity Part 1
(Fall 2023)
Instructor:
Dr. Patrick Dicks
Building/classroom:
Online
Office:
Online
Meeting Days:
Thursdays every other week.
Phone:
803 450 3677
Meeting Time: 630pm to 840pm est
(Zoom)
E-mail:
pdicks@su.edu
Office Hours:
Fri 10am to 12pm est
Required Text and Instructional Materials
Principles of Cybersecurity, 1st Edition
By: Linda K. Lavender
Copyright: 2020
Additional resources will be provided when needed.
Homework / Assignments:
Assignment
Due Date:
Weight
Read chapter 1 and complete all quick look activities
Sep 3
rd
12.5%
Read chapter 2 and complete all quick look activities
Sep 10
th
12.5%
Select a recent cyber-attack ( No older than 6 months old)
and write a 3
page on it. Include where it happened, what led up to it and how future
attacks can be prevented. APA 7th edition guidelines. Minimum 5 – 10
references.
Sep 17
th
12.5%
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.ipd.pdf
Summary
APA 7th edition.
Sep 24
th
12.5%
Read chapter 5 and complete all quick look activities
Oct 1
st
12.5%
Read chapter 8 and complete all quick look activities
Oct 8
th
12.5%
Your organization needs to subnet its existing Class C private network
(Class C: 192.168.0.0 to 192.168.255.255) into three networks. Explain
why your company needs to subnet its private network. Write a 2-page
paper to explain this. APA 7
th
edition is required
Oct 15
th
12.5%
Read chapter 9 and complete all quick look activities
Oct 20
th
12.5%
Page 1 of 5
Class
Dates
Class Work
Topics &
Homework
Aug 28
th
2023
Review Syllabus & Begin Intro to
Cybersecurity Tool Providers
Infrastructure, Endpoint,
Application, Messaging,
Web, IoT, SOAR
Read chapter 1 and
complete all quick
look activities
Aug 28
th
2023
Continue Intro to Cybersecurity Tool
Providers
Threat Intel, Mobile/Data
Security, Risk and
Compliance, Identity and
Access, Deception
Read chapter 1 and
complete all quick
look activities
September
3
rd
, 2023
Review Regulatory Requirements and
Frameworks
SOX, GLBA, NIST, etc.
Read chapter 2 and
complete all quick
look activities
September
3
rd
, 2023
Discuss Supportive Organizations
SANS, FS-ISAC,
ISACA, ISSA, InfraGard
TBD
September
3rd, 2023
Review Attacks and Threat
Methodologies
Select a recent
cyber-attack (
No
older than 6
months old
) and
write a 3-page paper
on it. Include where
it happened, what
led up to it and how
future attacks can be
prevented.
APA 7th edition
guidelines.
Minimum 5 – 10
references.
September
10
th
2023
Review Attacks and Threat
Methodologies
TBD
September
10
th
2023
Review Cyber References
NIST Computer Security
Resource Center
Read the updated
NIST updated
August 2023 draft.
https://nvlpubs.nist.g
ov/nistpubs/CSWP/
NIST.CSWP.29.ipd.
pdf
Give a two page
summary of your
views of this
framework.
APA 7th edition.
September
10
th
2023
Quantum Computing
Algorithms
TBD
September
17
th
2023
Review Vulnerabilities & Protection
Vulnerabilities &
Protection
Read chapter 5 and
complete all quick
look activities
September
17
th
2023
Discuss Network Security and
Network Threats
Network Threats
Recent 2023 Articles
September
Review Protecting Network Services
Networks
Read chapter 8 and
Page 2 of 5
Class
Dates
Class Work
Topics &
Homework
24
th
2023
& Wireless Networks
complete all quick
look activities
September
24
th
2023
Discuss Data:
Encryption,
Cryptography and Threats
Encryption
Encryption Articles
Oct 1
st
2023
Discuss Penetration Testing & Cloud
Computing
Penetration Testing
Read chapter 9 and
complete all quick
look activities
Oct 8
th
2023
Review Risk Management &
Continuity of Operations
Your organization
needs to subnet its
existing Class C
private network into
three networks.
Explain why your
company needs to
subnet its private
network.
Write a 2-page
paper to explain
this. APA 7
th
edition is required
Oct 15
th
2023
Cybersecurity
AI/ML in Cybersecurity
How AI
and ML are
used in cybersecurity
Course Description
This course provides intermediate content to support the student’s ability to understand and successful pass the
CompTIA Security+ Exam.
Although the requirements to sit for the exam include 3-4 years of practical work
experience, the content and strategy for exam success can be garnered in the combination of parts 1 & 2 of this
course.
Course Objectives
Students focus on reading and hands-on assignments with some keyword and question review along with cases and
simulations.
Grading Scale
Percentage
90%
- 100%:
A
79%
-
89%:
B
69%
-
78%:
C
59%
-
68%:
D
<59
F
POLICIES AND PROCEDURES
Course Communication
Course communication will be primarily handled through e-mail and Canvas.
Late Policy
Page 3 of 5
8
7
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Late assignments are penalized.
Academic Integrity Code:
Trust and mutual respect are essential to an environment in which learning is fostered. To encourage and support
such an environment, the university adopted an Integrity Code based on the recommendations of the Student
Government Association and the Faculty Assembly. Students are expected to read the provisions of the Integrity
Code and to abide by them. The university’s Integrity Code provides mechanisms for dealing with academic
dishonesty. It is printed in the Student Handbook as follows:
The SU Academic Integrity Code prohibits lying, stealing, and cheating. As a faculty member
of SU, I am dedicated to upholding the standards of academic integrity prescribed by the
Academic Integrity Code, and I do not tolerate academic dishonesty for any reason. If I
suspect a violation has occurred, I will take action. If you have questions about the Academic
Integrity Code, please come talk to me or refer to Academic Integrity Code on the SU website.
Logging in to a SU system with a SU issued login signifies that you are agreeing to abide by
the SU Academic Integrity Code.
Class Attendance Policy:
Attendance is considered part of class participation and is graded heavily.
The instructor will accept lists of students scheduled to miss class days due to university-sponsored activities from
coaches or other university representatives as a source of verification, but it is the student’s responsibility to notify
the instructor before the absence and complete all specified work that is due on the day of the absence prior to
missing class.
Failure to take an exam and/or to submit required assignments on time may result in severe grade penalties
(including no credit for that requirement).
At the Professor’s discretion
, make-up exams may be given in the case
of unavoidable conflicts.
Please be sure to properly manage your time so that you will have all assignments completed according to the
course schedule.
University’s Religious Observances Policy
:
“Shenandoah University is committed to nondiscrimination, diversity, inclusiveness and
support for its students, faculty, employees and staff, regardless of religious affiliation or
non-affiliation, in accordance with state and federal laws and regulations. Shenandoah
will not permit religious discrimination in accordance with the US Equal Employment
Opportunity Commission (EEOC). If a student requires an accommodation for a religious
observance, please refer to the academic catalogue to access the Religious Observances
Policy, complete the required paperwork and notify the University
(coordinator/instructor) before the end of the drop/add period.”
Services for Students with Disabilities Policy Statement:
Shenandoah University recognizes the mandates of the Rehabilitation Act of 1973 and the
Americans with Disabilities Act of 1990 by adopting this policy which directly reflects the
requirements of these acts. It is the policy of Shenandoah University that no otherwise
qualified individual is denied reasonable and appropriate access to or participation in any
program or activity of the university because of a disability. Pursuant to this policy, the
university employs a Coordinator of Disabilities Services as a resource for students, faculty,
and staff. Individuals who believe they have a disability covered under either of the acts
named above may document the disability and request assistance from the Coordinator.
Page 4 of 5
Faculty and staff charged with assisting those with disabilities may utilize the services of the
Coordinator as a resource of expertise and assistance.
Refer to the Student Handbook for more detailed information on policies and procedures for Students with
Disabilities.
Page 5 of 5