As more and more computing systems rely on networking technology, computer security is becoming more important. In addition, the skills to break software and penetrate network defenses are more widely available. As such, what is needed is for students with high moral character to learn the techniques used by attackers, both to test the systems for which they are responsible and also to construct solid defenses to protect against these attacks. This course will teach students these skills, along with the necessary moral and ethical backdrop.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Apply the knowledge of computing and mathematics appropriate to the discipline of computer security.
- Demonstrate the ability to analyze the tactics, techniques, and practices of current computer security threats.
- Demonstrate the ability to use current tools, techniques, and skills necessary to cost-effectively respond to computer security threats.
- Apply the appropriate mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer security systems.
- Describe the professional, ethical, legal, and social issues and responsibilities involving secure computing.
- Apply a biblical worldview to secure computing methods.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions are collaborative learning experiences. Therefore, the student will create a thread in response to the provided prompt for each discussion. Each thread must be at least 300 words and demonstrate course-related knowledge. In addition to the thread, the student will reply to the threads of at least 2 classmates. Each reply must be at least 100 words. At least 1 citation must be included in each thread and reply. Current APA formatting is required for any citations.
CybrScore Lab Assignments (6)
Using a virtual lab environment, the student will complete computer security lab assignments that will give him or her an opportunity to demonstrate mastery of the lessons learned during the assigned or previous module.
Each quiz will cover the Learn material for the Module: Week in which it is assigned as well as the preceding Modules: Weeks. Each exam will be open-book/open-notes and will have a time limit of 45 minutes. Each quiz will contain a variety of multiple-choice and true/false questions.
Quiz: Final Exam
The student will complete a comprehensive Quiz: Final Exam which will cover all the material from the course. This exam will be open-book/open-notes, contain a variety of multiple-choice and true/false questions and have a time limit of 2 hours.