DRAFT COS 200 / ITT 200 – Introduction to Cyber Security M. Monnin Page 1 of 8 University of Southern Maine COS 200 / ITT 200 – Introduction to Cyber Security College of Science, Technology & Health Fall 2018, COS 200-0001 Department of Technology & ITT 200-0001 Mark Monnin Course Syllabus Course Description: An introduction to the fundamentals of cyber security and information assurance. Students will develop a knowledge base for defining and recognizing both online threats and potential targets, and develop intellectual tools for evaluating relative risks within cyberspace. Students will apply theories and best practices for addressing potential costs of countermeasures for cyber attacks. Prerequisite: COS 160/170 or instructor permission. Offered fall semester only. Lecture and lab. Cr 3. Outcomes: 1. Explain what is meant by integrity, confidentiality, and authentication. 2. Explain the relationship between threats, vulnerabilities, countermeasures, attacks, compromises and remediation. 3. Describe legal and ethical considerations related to the handling and management of enterprise information assets. 4. Give an example of how inside and external attacks are similar and are different. 5. Explain the three key factors involved in authentication and how they are used to verify identity and grant access to a system. 6. Explain the process and value of two-factor authentication. 7. Explain how cryptosystems offer integrity, confidentiality and authentication. 8. Explain how cryptographic encryption algorithms are used to implement confidentiality in document transfer. 9. Explain digital signatures and certificates. 10. Explain how public key infrastructure (PKI) works. 11. Explain how one-way functions are used to implement a non-repudiation service. 12. Describe a situation where a forensic investigation would be necessary. Copyright 2018 Mark Monnin
8
Embed
Course Syllabus - University of Southern Maine · 2. Explain the relationship between threats, vulnerabilities, countermeasures, attacks, compromises and remediation. 3. Describe
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
DRAFT
COS 200 / ITT 200 – Introduction to Cyber Security M. Monnin Page 1 of 8
University of Southern Maine
COS 200 / ITT 200 – Introduction to Cyber Security
College of Science, Technology & Health Fall 2018, COS 200-0001
Department of Technology & ITT 200-0001
Mark Monnin
Course Syllabus
Course Description:
An introduction to the fundamentals of cyber security and information assurance. Students will develop a
knowledge base for defining and recognizing both online threats and potential targets, and develop
intellectual tools for evaluating relative risks within cyberspace. Students will apply theories and best
practices for addressing potential costs of countermeasures for cyber attacks. Prerequisite: COS 160/170
or instructor permission. Offered fall semester only. Lecture and lab. Cr 3.
Outcomes:
1. Explain what is meant by integrity, confidentiality, and authentication.
2. Explain the relationship between threats, vulnerabilities, countermeasures, attacks, compromises and
remediation.
3. Describe legal and ethical considerations related to the handling and management of enterprise information
assets.
4. Give an example of how inside and external attacks are similar and are different.
5. Explain the three key factors involved in authentication and how they are used to verify identity and grant
access to a system.
6. Explain the process and value of two-factor authentication.
7. Explain how cryptosystems offer integrity, confidentiality and authentication.
8. Explain how cryptographic encryption algorithms are used to implement confidentiality in document
transfer.
9. Explain digital signatures and certificates.
10. Explain how public key infrastructure (PKI) works.
11. Explain how one-way functions are used to implement a non-repudiation service.
12. Describe a situation where a forensic investigation would be necessary.
Copyright 2018 Mark Monnin
DRAFT
COS 200 / ITT 200 – Introduction to Cyber Security M. Monnin Page 2 of 8
13. Explain how a Denial of Service attack works against an organization’s network.
14. Identify and distinguish between the different types of Malware (viruses, Trojan horses, worms).
Text:
CISSP Guide to Security Essentials
Authors: Peter H. Gregory
Edition: 2nd edition
Publisher: Cengage Learning
Meeting time and Location:
This course meets every Monday and Wednesday from 2:00pm until 3:15pm in JMC 242 (Gorham)
COS 200 / ITT 200 – Introduction to Cyber Security M. Monnin Page 5 of 8
Grading:
Students final grade will be based on the policies and requirements stated in this syllabus and will use the
following criteria:
A All requirements completed at a high level of quality demonstrating an exceptional effort.
B All requirements completed at a high level of quality demonstrating a high level of effort.
C All requirements successfully completed demonstrating acceptable effort.
D Requirements completed at a low level demonstrating a minimum effort.
F Requirements not completed at an acceptable level.
I (Incomplete) Legitimate extraordinary circumstances prevent the student from
completing course requirements.
Students must complete the course requirements by a date specified by the professor within one semester of
receiving an incomplete grade. Procrastination is not considered to be a legitimate extraordinary circumstance.
It is expected that students will request consideration for incomplete grades in writing as early in the course as
possible. The request must include the reason for requesting an incomplete, and a plan for completing the work
required.
Homework 10 points each assignment (unless otherwise stated) Other Assignments/Projects varies (will be announced on the assignment) First Exam 100 points Second Exam 100 points Final Exam 100 points
How your grade is computed: This course is not graded on a
curve. All points are considered equal.
To compute your grade, just add up all of your points and divide
by the total number of points possible (and then multiply the
result by 100 to get a percent).
As an example, if you earned 437 points out of a total 520 points possible, you
would have had earned 84.0% of all points, and earned a B (yea!)
BTW: Just for the record, unlike the photo, there is no A+ grade at USM,
which is fairly common at colleges– sorry folks…
A ≥ 95%
A- ≥ 90%
B+ ≥ 87%
B ≥ 83%
B- ≥ 80%
C+ ≥ 77%
C ≥ 73%
C- ≥ 70%
D+ ≥ 67%
D ≥ 63%
D- ≥ 60%
F < 60%
NOTE: If all requirements are not completed, a course grade of D or F may be assigned regardless of the
overall grade points. If students cheat on course assignments, actions taken may include a failing
assignment grade, a failing course grade, or a failing course grade with additional University action.
Copyright 2018 Mark Monnin
DRAFT
COS 200 / ITT 200 – Introduction to Cyber Security M. Monnin Page 6 of 8
Cancellations and Emergencies:
Cancellations due to inclement weather are announced on the radio or may be obtained by calling
the University of Southern Maine’s hotline: 780-4800.