| 
                    
                      | 2025-2026 College Catalog 
   |  CIS 288 - Fundamentals of Cybersecurity   4 Contact Hours, 4 Credits4 lecture periods 0 lab periods
 
 
 Introduction to cyber security policy, doctrine, and operational constraints. Includes a broad survey of networking principles, cybersecurity concepts, tools, technologies, and best practices. Also includes hands-on activities to enhance familiarity with networking concepts and practice cybersecurity techniques and procedures.
 
 Information: This course is designed to meet the University of Arizona South CYBV 301 requirement and is preparatory coursework for the UA South Cyber Operations program. Please see a financial aid or Veteran’s Affairs advisor to determine funding eligibility as appropriate.
 Gen-Ed: Meets AGEC Options; Meets CTE - Options
 
 
 
 
 .png)   
 Course Learning Outcomes
 
 
	Compare the different types of cyberattacks.Explain the major U.S, and International laws governing cyberspace, the restrictions they place on cyber operations, and how they impact an organization’s overall cyber defensive strategy.Describe the concepts and best practices of a Defense in Depth strategy.Explain the Vulnerability-Threat-Control Paradigm.Describe Confidentiality-Integrity-Availability (C-I-A) security triad.Explain the similarities and differences between OSI and TCP/IP Model.Explain security shortcomings and flaws in networking hardware and devices.Demonstrate methods to secure infrastructure, hosts, networks, and the perimeter. Performance Objectives:
 
 
	Define and explain the Vulnerability-Threat-Control Paradigm.Identify and describe the trade-offs in the (CIA) Confidentiality-Integrity-Availability security triad.Identify and describe the concepts and best practices of a Defense in Depth strategy.Identify and describe the types of malware, how malware spreads, and how to mitigate its effects.Identify and describe the types of networks to include LAN, WAN, MAN, PAN, NAN, WLAN, and the internet. Describe and explain the capabilities, characteristics and security flaws of network hardware devices and their operating systems.Identify and explain how to design basic network architectures.Identify and explain the similarities and differences between the OSI & the TCP/IP Model.Identify and describe the basic functions, uses, and characteristics of network protocols.Identify and describe the history and fundamentals of cryptography.Identify and describe the different types of cyberattacks.Describe and explain the active cyber defense cycle’s techniques and mitigation strategies.Identify and explain the major U.S, and International laws governing cyberspace, the restrictions they place on cyber operations, and how they can impact an organizations overall defensive strategy. Outline:
 
 
	Vulnerability-Threat-Control Paradigm
	
		Vulnerability-Threat-Control ParadigmCIA triadTypes of threats and threat actorsThreat Method-Opportunity-MotiveIdentify and mitigate harm through risk managementConcepts and best practices of a Defense in Depth strategy
		
			Uniform ProtectionProtected EnclavesInformation CentricThreat Vector AnalysisViruses, Worms, Trojans & other Malware
	
		Types of malware, how it spreads
		
			VirusesWormsTrojansRansomwareCapabilities and goals of different types of malware
		
			Data harvestingUnauthorized system accessDenial of Service, Distributed Denial of Service (DOS, DDOS) and its effects on availabilityData destructionMalware mitigation and prevention strategies
		
			System scanning and monitoringData integrity checksProgram execution blockingSystem patching & hardeningUser education and security culture (e.g., social engineering techniques)Network Fundamentals
	
		Types of networks to include LAN, WAN, MAN, PAN, NAN, WLAN, and the InternetCapabilities, characteristics and security limitations of network hardware devices and their operating systems
		
			HubsBridgesSwitchesRoutersFirewallsTechniques, methods, and systems for fighting malware
		
			Intrusion Detection Systems (IDS)Intrusion Prevention Systems (IPS)HoneypotsDesigning basic network architectures a.   Identifying functionality b.   modularity of design c.   hierarchical design principles in network architectures d.   using VLANs (virtual local area networks) to limit broadcasts 
	Protocol Stacks and IP Concepts  
	
		Introduction and Use of the 7-layered Open Systems Interconnect (OSI) model for Networking
		
			Physical LayerData Link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication LayerRelation of the 7-layered OSI Model to the four layers of the TCP/IP (Transmission Control Protocol/Internet Protocol) ModelProtocol functions, uses, and their operation in the OSI Model
		
			Media Access Control (MAC) Addressing in local area networksARP (Address Resolution Protocol)Internet Protocol (IP)Transmission Control Protocol (TCP)User Datagram Protocol (UDP)Internet Control Message Protocol (ICMP)Simple Network Management Protocol (SNMP)Border Gateway Protocol (BGP)Similarities and differences between the IPv4 vs. IPv6 standards.Function of the Domain Name System (DNS) and its support of network communications.Cryptography & Securing data at rest and on the move
	
		History and fundamentals of cryptography
		
			Communications challenges and cryptographic goalsPlain text vs. Cipher textHistoryCiphers and Cryptanalysis systemsOne-Time PadsCryptography vs. CryptologyCryptosystemsKeysKey Exchange and ProtectionDefine and explain the types of Cryptographic Systems
		
			Symmetric Encryption (Private Key Encryption)Asymmetric Encryption (Public Key Encryption)Diffie-Hellman Key ExchangeHash FunctionsDigital SignaturesMajor capabilities, limitations, characteristics, and usages of common cryptographic algorithms.Capabilities, characteristics, and security vulnerabilities presented by Steganography techniques and tools.
		
			History of steganographySteganography techniquesOpen-Source tools for studying steganography 
	Cyber Attacks, Defenses, and Law
	
		Classification of Cyber Attacks
		
			Network based attacksClient side attacksSocial Engineering attacksActive cyber defense cycle’s techniques and mitigation strategies
	
		Proper network architecturesImplementation of passive defensesCyber Threat Intelligence (CTI)Network Security Monitoring (NSM)Incident Response (IR)Threat and Environment Manipulation (TEM)Introduction to U.S. Federal/State laws governing cyberspace, and relating these laws to international laws.
	
		Restrictions on cyber operationsOrganizational impactOrganizational defensive strategies 
 
 
 
   |