1 Malagis

Csec 630 Team Assignment Tracking

INTRODUCTION With the advancement of the technological era, the use of computers have not only become the common tool for everyday activities, but it has also blossomed into the most unique device with operating incentives that no other discovery of its era has been able to offer. With the computers development, the development of the computers Operating system and functionalities too has increased along with the growth in criminal intent of hackers to gain access to sophisticated networks. The Operating System can simply be defined as the software and hardware that controls the function of a computer. This may include keeping track of the files, managing the output and input of data, maintaining the computer controls, and processing of the computers programs and applications. Other roles may include but are not limited to managing the functioning of the computer hardware, running the applications programs, serving as an interface between the computer and the user, and allocating computer resources to various functions (Smith, 2011). Because of the growth in its functionality, computer administrators are continuously being faced with the task of arming the OS with protective measures to maintain the integrity of the computers hardware and software. The OS must be able to protect itself from unauthorized users, protect from unauthorized access to information, but most importantly changing of modification of data or programs. The OS must also be able to keep confidentiality. To keep confidentiality OS must limit access to lose with out permission to view certain classified inform or data (Ball, 2009). This will make sure that information is protected and keep in private. Lastly, the OS must be able to keeps its authenticity. This is something the computer can use to verify 2 | P a g e

CSEC Course Listing

Cyberspace and Cybersecurity (CSEC 610, 6 Credits)
(Must be taken as the first course in the program.) A study of the fundamentals of cyberspace and cybersecurity. Topics include cyber architecture, cyber services, protocols, algorithms, hardware components, software components, programming languages, various cybersecurity mechanisms, business continuity planning, security management practices, security architecture, operations security, physical security, cyber terrorism, and national security.

Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology (CSEC 620, 6 Credits)
Prerequisite: CSEC 610. An examination of the human aspects in cybersecurity. Topics include ethics, relevant laws, regulations, policies, standards, psychology, and hacker culture. Emphasis is on the human element and the motivations for cyber crimes. Analysis covers techniques to prevent intrusions and attacks that threaten organizational data.

Prevention and Protection Strategies in Cybersecurity (CSEC 630, 6 Credits)
Prerequisite: CSEC 610. An in-depth study of the theories and practices for prevention of cyber-attacks. Countermeasures discussed include training, encryption, virtual private networks, policies, practices, access controls, secure systems development, software assurance arguments, verification and validation; firewall architectures, anti-virus, patching practices, personnel security practices, and physical security practices. Business continuity plans and disaster recovery plans (BCP, DRP) are also discussed. Strategies for large-scale prevention are also discussed, such as critical infrastructure protection, international collaboration and law enforcement.

National Cybersecurity Policy and Law (CSEC 635, 6 Credits)
An exploration of the role of government in securing cyberspace. Topics include federal, state, and local entities involved in cybersecurity; relevant laws and regulation; concepts of civil liberties, intellectual property, and privacy; policy formulation and analysis; law enforcement; development and diffusion of standards; and national security. Discussion also covers public/private engagement models and opportunities and tools for government to encourage cybersecurity education, awareness, and research.

Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing (CSEC 640, 6 Credits)
Prerequisite: CSEC 610. An in-depth study of the theory and practice of intrusion detection and prevention in cyberspace. Topics include network security, monitoring, auditing, intrusion detection, intrusion prevention, and ethical penetration testing. Emphasis is on methods to identify system vulnerabilities and threats and prevent attacks.

Enterprise and Cloud Cybersecurity Policy (CSEC 645, 6 Credits)
Prerequisite: CSEC 635. An exploration of organizational policies to respond to cybersecurity threats. Topics include strategic cybersecurity initiatives, cybersecurity in interorganizational relationships, increasing cybersecurity awareness in the organization, compliance issues, liability, and promoting a culture of sensitivity to cybersecurity issues.

Cyber Crime Investigation and Digital Forensics (CSEC 650, 6 Credits)
Prerequisite: CSEC 610. An in-depth study of the theory and practice of digital forensics. Topics include computer forensics, network forensics, cell phone forensics, and other types of digital forensics. Discussion also covers identification, collection, acquisition, authentication, preservation, examination, analysis, and presentation of evidence for prosecution purposes

Global Cybersecurity (CSEC 655, 6 Credits)
Prerequisite: CSEC 645. An in-depth study of cybersecurity from a global perspective. Topics include cyberterrorism, cybercrime, and cyberwarfare; the international legal environment; nation- and region-specific norms regarding privacy and intellectual property; international standard setting; effects on trade (including offshore outsourcing); and opportunities for international cooperation.

Digital Forensic Investigations (CSEC 661, 6 Credits)
Prerequisite: CSEC 610. A study of the processes and technologies used in the collection, preservation, and analysis of digital evidence in local, networked, and cloud environments. Discussion covers validating data, reporting evidence, and preparing depositions, as well as recovering information from encrypted, obscured, or deleted sources. Topics also include emerging forensic issues in computer, peripheral, and mobile environments and their global implications.

Cyber Incident Analysis and Response (CSEC 662, 6 Credits)
Prerequisite: CSEC 610. An examination of policies and procedures related to security incidents, exposures, and risks and technologies used to respond to such threats. Topics include dynamic vulnerability analysis, intrusion detection, attack response, evidence protection, and business continuity. Discussion also covers types and modes of computer-facilitated attacks, readiness, and evidence scope, as well as the role of computer emergency response teams.

Cybersecurity Capstone (CSEC 670, 6 Credits)
Prerequisite: Completion of all other program courses. A study of and an exercise in developing, leading, and implementing effective enterprise- and national-level cybersecurity programs. Focus is on establishing programs that combine technological, policy, training, auditing, personnel, and physical elements. Challenges within specific industries (such as health, banking, finance, and manufacturing) are discussed. Topics include enterprise architecture, risk management, vulnerability assessment, threat analysis, crisis management, security architecture, security models, security policy development and implementation, security compliance, information privacy, identity management, incident response, disaster recovery, and business continuity planning. A project reflecting integration and application of learning of cybersecurity is included.

Leave a Comment


Your email address will not be published. Required fields are marked *