2023-2024 College Catalog [ARCHIVED CATALOG]
|
CIS 288 - Fundamentals of Cybersecurity 4 Credits, 4 Contact Hours 4 lecture periods 0 lab periods
Introduction to cyber security policy, doctrine, and operational constraints. Includes a broad survey of networking principles, cybersecurity concepts, tools, technologies, and best practices. Also includes hands-on activities to enhance familiarity with networking concepts and practice cybersecurity techniques and procedures.
Information: This course is designed to meet the University of Arizona South CYBV 301 requirement and is preparatory coursework for the UA South Cyber Operations program. Please see a financial aid or Veteran’s Affairs advisor to determine funding eligibility as appropriate. Gen-Ed: Meets AGEC Options requirement; Meets CTE - Options requirement
Course Learning Outcomes
- Compare the different types of cyberattacks.
- Explain the major U.S, and International laws governing cyberspace, the restrictions they place on cyber operations, and how they impact an organization’s overall cyber defensive strategy.
- Describe the concepts and best practices of a Defense in Depth strategy.
- Explain the Vulnerability-Threat-Control Paradigm.
- Describe Confidentiality-Integrity-Availability (C-I-A) security triad.
- Explain the similarities and differences between OSI and TCP/IP Model.
- Explain security shortcomings and flaws in networking hardware and devices.
- Demonstrate methods to secure infrastructure, hosts, networks, and the perimeter.
Performance Objectives:
- Define and explain the Vulnerability-Threat-Control Paradigm.
- Identify and describe the trade-offs in the (CIA) Confidentiality-Integrity-Availability security triad.
- Identify and describe the concepts and best practices of a Defense in Depth strategy.
- Identify and describe the types of malware, how malware spreads, and how to mitigate its effects.
- Identify and describe the types of networks to include LAN, WAN, MAN, PAN, NAN, WLAN, and the internet.
- Describe and explain the capabilities, characteristics and security flaws of network hardware devices and their operating systems.
- Identify and explain how to design basic network architectures.
- Identify and explain the similarities and differences between the OSI & the TCP/IP Model.
- Identify and describe the basic functions, uses, and characteristics of network protocols.
- Identify and describe the history and fundamentals of cryptography.
- Identify and describe the different types of cyberattacks.
- Describe and explain the active cyber defense cycle’s techniques and mitigation strategies.
- Identify and explain the major U.S, and International laws governing cyberspace, the restrictions they place on cyber operations, and how they can impact an organizations overall defensive strategy.
Outline:
- Vulnerability-Threat-Control Paradigm
- Vulnerability-Threat-Control Paradigm
- CIA triad
- Types of threats and threat actors
- Threat Method-Opportunity-Motive
- Identify and mitigate harm through risk management
- Concepts and best practices of a Defense in Depth strategy
- Uniform Protection
- Protected Enclaves
- Information Centric
- Threat Vector Analysis
- Viruses, Worms, Trojans & other Malware
- Types of malware, how it spreads
- Viruses
- Worms
- Trojans
- Ransomware
- Capabilities and goals of different types of malware
- Data harvesting
- Unauthorized system access
- Denial of Service, Distributed Denial of Service (DOS, DDOS) and its effects on availability
- Data destruction
- Malware mitigation and prevention strategies
- System scanning and monitoring
- Data integrity checks
- Program execution blocking
- System patching & hardening
- User education and security culture (e.g., social engineering techniques)
- Network Fundamentals
- Types of networks to include LAN, WAN, MAN, PAN, NAN, WLAN, and the Internet
- Capabilities, characteristics and security limitations of network hardware devices and their operating systems
- Hubs
- Bridges
- Switches
- Routers
- Firewalls
- Techniques, methods, and systems for fighting malware
- Intrusion Detection Systems (IDS)
- Intrusion Prevention Systems (IPS)
- Honeypots
- Designing basic network architectures
a. Identifying functionality
b. modularity of design
c. hierarchical design principles in network architectures
d. using VLANs (virtual local area networks) to limit broadcasts
- Protocol Stacks and IP Concepts
- Introduction and Use of the 7-layered Open Systems Interconnect (OSI) model for Networking
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
- Relation of the 7-layered OSI Model to the four layers of the TCP/IP (Transmission Control Protocol/Internet Protocol) Model
- Protocol functions, uses, and their operation in the OSI Model
- Media Access Control (MAC) Addressing in local area networks
- ARP (Address Resolution Protocol)
- Internet Protocol (IP)
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- Internet Control Message Protocol (ICMP)
- Simple Network Management Protocol (SNMP)
- Border Gateway Protocol (BGP)
- Similarities and differences between the IPv4 vs. IPv6 standards.
- Function of the Domain Name System (DNS) and its support of network communications.
- Cryptography & Securing data at rest and on the move
- History and fundamentals of cryptography
- Communications challenges and cryptographic goals
- Plain text vs. Cipher text
- History
- Ciphers and Cryptanalysis systems
- One-Time Pads
- Cryptography vs. Cryptology
- Cryptosystems
- Keys
- Key Exchange and Protection
- Define and explain the types of Cryptographic Systems
- Symmetric Encryption (Private Key Encryption)
- Asymmetric Encryption (Public Key Encryption)
- Diffie-Hellman Key Exchange
- Hash Functions
- Digital Signatures
- Major capabilities, limitations, characteristics, and usages of common cryptographic algorithms.
- Capabilities, characteristics, and security vulnerabilities presented by Steganography techniques and tools.
- History of steganography
- Steganography techniques
- Open-Source tools for studying steganography
- Cyber Attacks, Defenses, and Law
- Classification of Cyber Attacks
- Network based attacks
- Client side attacks
- Social Engineering attacks
- Active cyber defense cycle’s techniques and mitigation strategies
- Proper network architectures
- Implementation of passive defenses
- Cyber Threat Intelligence (CTI)
- Network Security Monitoring (NSM)
- Incident Response (IR)
- Threat and Environment Manipulation (TEM)
- Introduction to U.S. Federal/State laws governing cyberspace, and relating these laws to international laws.
- Restrictions on cyber operations
- Organizational impact
- Organizational defensive strategies
Effective Term: Fall 2023
|