Dec 22, 2024  
Course/Program Inventory 
    
Course/Program Inventory

CSN 3010 - Cyber Security



Clock Hours: 203

Delivery Mode
on-ground

Prerequisites: Completion of 1st and 2nd Trimester

Course Description:
This course is designed to educate students about how to move into the cybersecurity field. It covers the five phases of ethical hacking; reconnaissance, scanning, gain access, maintenance access, and cover your tracks; in order to prepare you to create a counter attack. 

Student Learning Outcomes:
  1. Understand penetration testing to find vulnerabilities and risks with the purpose of securing a computer or network system. 

  1. Understand the concept of social engineering and methods hackers use to manipulate people to give out information or perform tasks that will give up critical information. 

  1. Understand how reconnaissance is used as a systematic attempt to locate, gather, identify, and record information about a target.  

  1. Understand how to identify scanning on a network; the process of actively connecting to a system to get a response and gather information.  

  1. Understand the enumeration phase, where you will extract and record as much information as you can about a network or system. 

  1. Understand how to use a vulnerability assessment to identify weaknesses in an organization infrastructure, including the operating system, web applications, and web server. 

  1. Understand the importance of and how to implement a strong password policy to diminish the possibility of hacking. 

  1. Understand how to combat various forms of malware. 

  1. Understand how to utilize tools; such as, sniffing, switched network sniffing, Wireshark, TCPDump, and additional sniffing tools to locate vulnerabilities in your network. 

  1. Utilize IDS (intrusion detection system) to monitor network traffic for suspicious activity. This included the use of firewalls and honeypots. 

  1. How to identify and protect networks from web server and web application attacks and SQL injections. 

  1. How to identify and protect against WiFi, Bluetooth, and Mobile Device attacks. 

  1. Understand the concept of Cloud Computing and Internet of Things and how to secure and protect them from attacks. 

  1. Understand the process of cryptography to convert data into secret code during transmission.