Cyber Security CYBER SECURITY

Similar documents
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

ITSY 2330 Intrusion Detection Course Syllabus

CCNA Cybersecurity Operations. Program Overview

ITSY Information Technology Security Course Syllabus Spring 2018

Common Syllabus revised

ET345P Control Systems [Onsite]

CCNA Cybersecurity Operations 1.1 Scope and Sequence

ISM 324: Information Systems Security Spring 2014

CompTIA Cybersecurity Analyst+

Computer Science Technology Department

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018

Course Syllabus: CompTIA A+ Hardware

ITT Technical Institute. TB143 Introduction to Personal Computers Onsite and Online Course SYLLABUS

Course Syllabus: CompTIA A+

Big Sandy Community and Technical College. Course Syllabus

COWLEY COLLEGE & Area Vocational Technical School

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS HPC INTERNETWORKING & GRID TECHNOLOGY HPC 1020

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Cisco Academy Year 2 Instructor: Shade Adeleke

High School Course Guide

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

b. Remediation will only be offered for courses offered at the home school.

Course Syllabus: CompTIA Network+

High School Course Guide Information Technology

Red Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

High School Course Guide Information Technology

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Endorsement: Business & Industry

CSC 4992 Cyber Security Practice

Recent Developments in Career and Technical Education. New York State Education Department November 2016

ITT Technical Institute. SD3120T Programming in Open Source with LAMP Onsite and Online Course SYLLABUS

Required Textbook and Materials. Course Objectives. Course Outline

CRN150 Fundamentals of Network Security

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Cybersecurity Essentials

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

Cisco Academy Year 2 Instructor: Ken Shade

Cisco Academy Year 1 Instructor: Ken Shade

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

CCRI Networking Technology I CSCO-1850 Spring 2014

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Oklahoma City ITD 1113: Windows Expert User Syllabus Fall, 2014

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Computer Technology. Computer Technology Associate in Applied Science

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Instructor: Eric Rettke Phone: (every few days)

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS HPC INTERNETWORKING & GRID TECHNOLOGY HPC 1020

Ktocareer. IT Academy. Kimberly Clavin, Manager of STEM Intiatives OHIO, USA

CENTRAL TEXAS COLLEGE INDUSTRIAL TECHNOLOGY DEPARTMENT SYLLABUS FOR GRPH 1305 INTRODUCTION TO GRAPHIC ARTS AND PRINTING SEMESTER HOURS CREDIT: 4

KOMAR UNIVERSITY OF SCIENCE AND TECHNOLOGY (KUST)

Network Security

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

HOUSTON COMMUNITY COLLEGE BUSINESS TECHNOLOGY NORTHEAST COLLEGE-NORTHLINE LOCATION COURSE SYLLABUS FALL 2011 COMPUTER APPLICATION I POFI 1301

CENTRAL TEXAS COLLEGE INDUSTRIAL TECHNOLOGY DEPARTMENT SYLLABUS FOR GRPH 1419 BINDERY AND FINISHING OPERATIONS

Computer Science Technology Department

The GenCyber Program. By Chris Ralph

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Oklahoma State University Spears School of Business Department of Management Information Systems

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Networking and Cybersecurity. Computer Service Technician. Cybersecurity Award: Career Studies Certificate Length: 25 credits

Updated: 2/14/2017 Page 1 of 6

Course Syllabus: CompTIA Network+

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX ADVANCED SYSTEM & NETWORK ADMINISTRATION CSIT 2475

Your Student s Head Start on Career Goals and College Aspirations

Part A: Course Outline

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Endorsement: Business & Industry

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

Administrative - Master Syllabus COVER SHEET

CSc 2310 Principles of Programming (Java) Jyoti Islam

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

COWLEY COLLEGE & Area Vocational Technical School

Standard Course Outline IS 656 Information Systems Security and Assurance

CyberVista Certify cybervista.net

Computer Science Technology Department

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

ITCC Cisco Exploration 1: Networking Fundamentals

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology

Syllabus Honors Java Programming 1 & 2

Cyber Security

Course Title: Network+/Networking Fundamentals. Course Section: CNS-101-I1. FORMAT: Online

The fast track to top skills and top jobs in cyber. Guaranteed.

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS CIW JAVASCRIPT FUNDAMENTALS CERTIFICATION WEB 2391

Class Hours: Saturday Monday Address: 9000 Overland Ave., Culver City, CA :00 p.m. 4:15 p.m. Location: Building and room number

IT Essentials PC Hardware and Software Grades 11-12

Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology

Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Computer Science Technology Department

ESET 349 Microcontroller Architecture, Fall 2018

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

Course Syllabus: Linux Essentials

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

DIABLO VALLEY COLLEGE CATALOG

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Transcription:

Cyber Security We live in a digital world. Whether it s keeping in touch with friends, operating a city s energy grid or strengthening national security, it happens online. The need to secure our networks has never been greater. The number of cyber attacks increases dramatically every year, and people with technical skills are needed to ensure online security. As a student in the Cybersecurity program at the Public Service Leadership Academy at Fowler, you ll learn how to make online information more secure and protect users from the growing threat of cyber attacks. This program teaches the core concepts needed to understand, assess and protect information security systems. This pathway will develop the knowledge and skills needed to master the core concepts in cybersecurity. The pathway will cover the three foundation areas of information security: Networking Operating Systems Systems Administration CAREER OPPORTUNITIES: Security Manager, Cyber Threat Analyst 59

Course of Study Cyber Security 9th Grade 10th Grade 11th Grade 12th Grade PSLA Exploratory (1 Credit CTE) CTE Cyber Security 100 CSS100 (1 Credit CTE) (CRJ107UC) CTE Cyber Security 200 CSS200 (2 Credits CTE) (CRJ333UC) Cyber Security CTE Integrated CTE300 (1 Credit) CTE Cyber Security 300 CSS300 (2 Credits CTE) (CRJ335UC) Cyber Security CTE Integrated ELA CTE400 (1 Credit) DISTRICT REQUIREMENTS Students must pass CTE Cyber Security 100, 200 and 300 to challenge the course approved technical assessment. All students in 9th grade will receive and Financial Management and CTE Exploratory classes. Student will have earned the 11th grade integrated science credit upon successful completion of the CTE Cybersecurity 100 and 200. Student will have earned the 12th grade integrated ELA credit upon successful completion of the CTE Cybersecurity 100, 200 and 300. Student will receive the CTE Endorsement upon successful completion of the CTE Cybersecurity Program and must pass the prescribed technical assessment and complete a commencement level project. 60

COURSE DESCRIPTION This course provides an overview and exploration of software and technology foundations for cybersecurity. The course emphasizes practical hands-on labs and exercises that will be used by students to gain an understanding of software technologies that are relevant to cybersecurity. By writing lab reports that document their findings and results, students will implement knowledge and skills in authentic situations. COURSE OBJECTIVES 1. Students will know and understand computers and how they relate to cybersecurity. 2. Students will understand the historical and societal context of cybersecurity. 3. Students will understand the basics of computer system and network fundamentals. 4. Students will understand the basics of computer math and computer number systems. 5. Students will be able to troubleshoot and diagnose computers. 6. Students will understand the relation between the physical and virtual worlds. INTEGRATED ACADEMICS 1 Credit (CTE 300) Course Syllabus Cyber Security 200 EQUIPMENT AND SUPPLIES School will provide: All necessary lab and classroom equipment. Student will provide: N/A TEXTBOOK TBD GRADING 10% Class attendance/ Participation 10% Oral Presentation 25% Assignments 25% Mid-Term Exam 30% Final Exam All work is due at the time and day specified when the assignment is given. Submission details for work to be graded will be given at the time the work is assigned. Quizzes will be given throughout the semester. The lowest quiz score (one score only) will be dropped when calculating the final course grade. ADDITIONAL COURSE POLICIES Students are required to follow all safety procedures. CYBER SECURITY Course Calendar Cyber Security 200 QUARTER UNITS OF STUDY 1 Course Introduction Computer System and Network Fundamentals Computer and Computer Number Systems Virtual Machines: VMware, VirtualBox, Kali Linux Command Line Interface: Windows 2 Command Line Interface: Linux File System Management Open-Source Software Management Host-Based Security Tools Network-Based Security Tools 3 Penetration Testing Reconnaissance Scanning 4 Exploitation Social Engineering Web-Based-Exploration Post-Exploitation and Maintaining Access Penetration Testing Wrap-Up Review and Final Exam 61

Time Frame WEEK 1-2 Course Introduction Computer System and Network Fundamentals What knowledge and skills are developed in this course? What is a computer system and how does it relate to a network? Configure a computer system and its software Explain how a computer is attached to the network Define and explain the IoT (Internet of Things) Syllabus Assignment #1 Related s 1,2,3,4,8,9 IT 1,2,3,4 1,2,3,5 IT-NET 1,2,3,4,5 IT-PRG 3,7,9 CCLS,, RST.11-12.1,2,3,4 WEEK 3-6 Computer and Computer Number Systems How do computers store data? How are numbers converted between binary and decimal systems? Describe how computers store data Explain decimal, binary, octal, and hexadecimal number systems Perform binary addition Convert numbers from binary to decimal and decimal to binary forms Assignment #2: Computer and Computer Number Systems Test 2,4,8,11, 12 IT 12 6,9 RST.11-12.1,2,3,4 Week 7-8 Virtual Machines: VMware, VirtualBox, Kali Linux What is a virtual machine? How is a virtual machine implemented? Define a virtual machine and describe its function Set up and maintain a virtual machine Compare and contrast different virtualization software Install Windows and Kali VM software Assignment #3: Virtual Machines Quiz 2,7,8,11 IT 4,5,7,12 1,2,4,7,8,9 IT-NET 3,4 IT-PRG 1,3,7,9

Time Frame WEEK 9-10 Command Line Interface: Windows What is the Windows Command line (CMD)? What are the advantages of the Command line? Explain and use basic Windows commands Navigate through a Windows system via CMD Assignment #4 Related 2,4,11,12 IT 1 1,2,6 CCLS,, CYBER SECURITY WEEK 11-12 Command Line Interface: Linux What is the Linux Terminal? What are the advantages of the Terminal? Explain and use basic Linux commands Navigate through a Linux system via Terminal Assignment #5 2,4,11 IT 12 1,2,6 WEEK 13-15 File System Management Open-Source Software Management What are the different file system structures? What is open source software? Compare and contrast different file types Explain how files are saved using different file systems including Fat32, NTFS and EXT Use different file systems to manage files Describe open source software and its uses Assignment #6 2,4,7,8,11 IT 7,9 2,4,9,10 IT-NET 1 63

Time Frame WEEK 16-18 Host-Based Security Tools How can security measures be implemented on a computer? Describe host-based security tools including antivirus software and firewalls Use host-based security tools to improve computer security Assignment #7 Quiz CTE 2,3,4,5,7, 8,9,11,12 5,6,9,8 CCLS,, WEEK 19-20 Network-Based Security Tools What are some different networkbased security tools? How are network security tools implemented on a system? Describe networkbased security tools including intrusion detection and prevention systems Explain the function of Network Access Controls and DMZ (demilitarized zone) in computer security Assignment #8 Quiz 2,4,7,8,11, 12 5,6,9,8 IT-NET 1,4,5 2,4,7,8,11, 12 64

Time Frame WEEK 21-24 Penetration Testing What is penetration testing? What are the benefits of conducting a penetration test? Describe penetration testing tools Use penetration testing to find vulnerabilities in a computer system Assignment #9 Related 1,2,4,5,7, 8,9,11 2,5,6,9,10 IT-NET 1,4,5 CCLS,, CYBER SECURITY WEEK 25-28 Reconnaissance How can outsiders obtain information about a computer system? Define reconnaissance Explain the connection between reconnaissance and control panel Explain the connection between reconnaissance and computer systems information Assignment #10 2,4,7,11 IT 9,10 5,6 2,4,7,11 WHST.11-12. WEEK 29-30 Scanning What is the purpose of doing a port scan? What information does a port scan reveal? Define open ports in a computer system Check for open ports in a computer system using the Command line Assignment #11 1,2,7,8,11 5,6 65

Time Frame WEEK 31-33 Exploitation How can a computer system be exploited? Define exploitation of a computer system Gain access into a computer system Assignment #12 CTE 1,2,3,5,7, 8,9,11,12,10 5,6 CCLS,, WEEK 34-36 Social Engineering Web-Based Exploitation How can someone use social engineering to exploit a computer user? Define social engineering and explain methods for preventing it Compare and contrast exploitation and social engineering Assignment #13 1,2,3,5,7, 8,9,11,12 IT 4,5,8,9,10 5,6 66

Time Frame WEEK 37-39 Post Exploitation and Maintaining Access Penetration Testing Wrap-Up What is a backdoor and how is it used to access computer information? Explain how access into a system is maintained after exploitation Describe and use Backdoor Trojan software Assignment #14 Related 1,2,3,5,7, 8,9,11,12 1,2,3,4,9, 10 IT-NET 1,5 IT-PRG 3 CCLS,, CYBER SECURITY WEEK 40 Review and Final Examination How can the knowledge and skills learned in this course be applied? Apply knowledge and skills to solve problems Assignment #15 Final Examination 1,2,4,5,6, 10,12 IT 1-12 9 67