Cybersecurity Part 1 - Fall 2023-1-1

docx

School

Virginia Tech *

*We aren’t endorsed by this school

Course

4474

Subject

Industrial Engineering

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by Hendog6969

Report
IST 588 – Intermediate Cybersecurity Part 1 (Fall 2023) Instructor: Dr. Patrick Dicks Building/classroom: Online Office: Online Meeting Days: Thursdays every other week. Phone: 803 450 3677 Meeting Time: 630pm to 840pm est (Zoom) E-mail: pdicks@su.edu Office Hours: Fri 10am to 12pm est Required Text and Instructional Materials Principles of Cybersecurity, 1st Edition By: Linda K. Lavender Copyright: 2020 Additional resources will be provided when needed. Homework / Assignments: Assignment Due Date: Weight Read chapter 1 and complete all quick look activities Sep 3 rd 12.5% Read chapter 2 and complete all quick look activities Sep 10 th 12.5% Select a recent cyber-attack ( No older than 6 months old) and write a 3 page on it. Include where it happened, what led up to it and how future attacks can be prevented. APA 7th edition guidelines. Minimum 5 – 10 references. Sep 17 th 12.5% https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.ipd.pdf Summary APA 7th edition. Sep 24 th 12.5% Read chapter 5 and complete all quick look activities Oct 1 st 12.5% Read chapter 8 and complete all quick look activities Oct 8 th 12.5% Your organization needs to subnet its existing Class C private network (Class C: 192.168.0.0 to 192.168.255.255) into three networks. Explain why your company needs to subnet its private network. Write a 2-page paper to explain this. APA 7 th edition is required Oct 15 th 12.5% Read chapter 9 and complete all quick look activities Oct 20 th 12.5% Page 1 of 5
Class Dates Class Work Topics & Homework Aug 28 th 2023 Review Syllabus & Begin Intro to Cybersecurity Tool Providers Infrastructure, Endpoint, Application, Messaging, Web, IoT, SOAR Read chapter 1 and complete all quick look activities Aug 28 th 2023 Continue Intro to Cybersecurity Tool Providers Threat Intel, Mobile/Data Security, Risk and Compliance, Identity and Access, Deception Read chapter 1 and complete all quick look activities September 3 rd , 2023 Review Regulatory Requirements and Frameworks SOX, GLBA, NIST, etc. Read chapter 2 and complete all quick look activities September 3 rd , 2023 Discuss Supportive Organizations SANS, FS-ISAC, ISACA, ISSA, InfraGard TBD September 3rd, 2023 Review Attacks and Threat Methodologies Select a recent cyber-attack ( No older than 6 months old ) and write a 3-page paper on it. Include where it happened, what led up to it and how future attacks can be prevented. APA 7th edition guidelines. Minimum 5 – 10 references. September 10 th 2023 Review Attacks and Threat Methodologies TBD September 10 th 2023 Review Cyber References NIST Computer Security Resource Center Read the updated NIST updated August 2023 draft. https://nvlpubs.nist.g ov/nistpubs/CSWP/ NIST.CSWP.29.ipd. pdf Give a two page summary of your views of this framework. APA 7th edition. September 10 th 2023 Quantum Computing Algorithms TBD September 17 th 2023 Review Vulnerabilities & Protection Vulnerabilities & Protection Read chapter 5 and complete all quick look activities September 17 th 2023 Discuss Network Security and Network Threats Network Threats Recent 2023 Articles September Review Protecting Network Services Networks Read chapter 8 and Page 2 of 5
Class Dates Class Work Topics & Homework 24 th 2023 & Wireless Networks complete all quick look activities September 24 th 2023 Discuss Data: Encryption, Cryptography and Threats Encryption Encryption Articles Oct 1 st 2023 Discuss Penetration Testing & Cloud Computing Penetration Testing Read chapter 9 and complete all quick look activities Oct 8 th 2023 Review Risk Management & Continuity of Operations Your organization needs to subnet its existing Class C private network into three networks. Explain why your company needs to subnet its private network. Write a 2-page paper to explain this. APA 7 th edition is required Oct 15 th 2023 Cybersecurity AI/ML in Cybersecurity How AI and ML are used in cybersecurity Course Description This course provides intermediate content to support the student’s ability to understand and successful pass the CompTIA Security+ Exam. Although the requirements to sit for the exam include 3-4 years of practical work experience, the content and strategy for exam success can be garnered in the combination of parts 1 & 2 of this course. Course Objectives Students focus on reading and hands-on assignments with some keyword and question review along with cases and simulations. Grading Scale Percentage 90% - 100%: A 79% - 89%: B 69% - 78%: C 59% - 68%: D <59 F POLICIES AND PROCEDURES Course Communication Course communication will be primarily handled through e-mail and Canvas. Late Policy Page 3 of 5 8 7 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Late assignments are penalized. Academic Integrity Code: Trust and mutual respect are essential to an environment in which learning is fostered. To encourage and support such an environment, the university adopted an Integrity Code based on the recommendations of the Student Government Association and the Faculty Assembly. Students are expected to read the provisions of the Integrity Code and to abide by them. The university’s Integrity Code provides mechanisms for dealing with academic dishonesty. It is printed in the Student Handbook as follows: The SU Academic Integrity Code prohibits lying, stealing, and cheating. As a faculty member of SU, I am dedicated to upholding the standards of academic integrity prescribed by the Academic Integrity Code, and I do not tolerate academic dishonesty for any reason. If I suspect a violation has occurred, I will take action. If you have questions about the Academic Integrity Code, please come talk to me or refer to Academic Integrity Code on the SU website. Logging in to a SU system with a SU issued login signifies that you are agreeing to abide by the SU Academic Integrity Code. Class Attendance Policy: Attendance is considered part of class participation and is graded heavily. The instructor will accept lists of students scheduled to miss class days due to university-sponsored activities from coaches or other university representatives as a source of verification, but it is the student’s responsibility to notify the instructor before the absence and complete all specified work that is due on the day of the absence prior to missing class. Failure to take an exam and/or to submit required assignments on time may result in severe grade penalties (including no credit for that requirement). At the Professor’s discretion , make-up exams may be given in the case of unavoidable conflicts. Please be sure to properly manage your time so that you will have all assignments completed according to the course schedule. University’s Religious Observances Policy : “Shenandoah University is committed to nondiscrimination, diversity, inclusiveness and support for its students, faculty, employees and staff, regardless of religious affiliation or non-affiliation, in accordance with state and federal laws and regulations. Shenandoah will not permit religious discrimination in accordance with the US Equal Employment Opportunity Commission (EEOC). If a student requires an accommodation for a religious observance, please refer to the academic catalogue to access the Religious Observances Policy, complete the required paperwork and notify the University (coordinator/instructor) before the end of the drop/add period.” Services for Students with Disabilities Policy Statement: Shenandoah University recognizes the mandates of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990 by adopting this policy which directly reflects the requirements of these acts. It is the policy of Shenandoah University that no otherwise qualified individual is denied reasonable and appropriate access to or participation in any program or activity of the university because of a disability. Pursuant to this policy, the university employs a Coordinator of Disabilities Services as a resource for students, faculty, and staff. Individuals who believe they have a disability covered under either of the acts named above may document the disability and request assistance from the Coordinator. Page 4 of 5
Faculty and staff charged with assisting those with disabilities may utilize the services of the Coordinator as a resource of expertise and assistance. Refer to the Student Handbook for more detailed information on policies and procedures for Students with Disabilities. Page 5 of 5