CCA CYBER SECURITY TRACK



Similar documents
Course Descriptions. preparation.

Computer Science Course Descriptions Page 1

Course Descriptions. CS 101 Intro to Computer Science

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

Brandman University. School of CCNA

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Information Systems Security Certificate Program

EC Council Certified Ethical Hacker V8

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

BIT Course Description

Computer and Information Sciences

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Bellevue University Cybersecurity Programs & Courses

[CEH]: Ethical Hacking and Countermeasures

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Principles of Information Assurance Syllabus

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Networking and Cyber Security Overview

PCCC PCCC Course Description

Computer Information Systems (CIS)

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

Information and Communications Technology Courses at a Glance

Access FedVTE online at: fedvte.usalearning.gov

EC-Council Ethical Hacking and Countermeasures

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Cybersecurity Certificate Programs

02-201: Programming for Scientists

Computer Network Engineering

Technical Courses. Course Catalog

9-12 An exploratory level course that provides an exposure to. careers and issues in information technology. Students

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications

EC-Council. Certified Ethical Hacker. Program Brochure

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Department of Computer Science

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

LINUX / INFORMATION SECURITY

DIABLO VALLEY COLLEGE CATALOG

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

Cyber Security Certificate

2667A - Introduction to Programming

Preliminary Course Syllabus

CCNA Security 2.0 Scope and Sequence

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

Certified Ethical Hacker (CEH)

Cyber R &D Research Roundtable

School of Management and Information Systems

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Bachelor of Information Technology (Network Security)

Kilgore College Course Syllabus

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

COURSE TITLE COURSE DESCRIPTION

Department of Computer Science

Course Title: ITAP 3471: Web Server Management

INFORMATION TECHNOLOGY (IT) 515

Security + Certification (ITSY 1076) Syllabus

Table of Contents. Introduction. Audience. At Course Completion

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Degrees Major in Computer Science Minor in Computer Science Major in Software Engineering

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

CURRICULUM VITAE EDUCATION:

IT and Cyber Security Training Courses

EC-Council. Program Brochure. EC-Council. Page 1

Department of Computer Science

Connecting PTE to Careers in Idaho

COP 2250 Object-Oriented Programming (Java SE) (3) PR General Elective (3) MAD 2104 Discrete Mathematics (3) General Elective (3)

Information Systems and Tech (IST)

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Computer Information Technology

DIVISION OF BUSINESS AND COMPUTER INFORMATION SYSTEMS BUSINESS DEPARTMENT -50- Statement of Business Department Mission and Purpose

ADVANCED SCHOOL OF SYSTEMS AND DATA STUDIES (ASSDAS) PROGRAM: CTech in Computer Science

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Bachelor of Science in Business Administration - Information Systems and Technology Major

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Management Information Systems 260 Web Programming Fall 2006 (CRN: 42459)

CCNA Security v1.0 Scope and Sequence

MiraCosta College Computer Studies Department ~

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ REVIEW DATE. Report Amended October 2011

CS Ethical Hacking Spring 2016

INFORMATION SECURITY TRAINING CATALOG (2015)

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Computer Network Engineering

Interested in Expanding your Technical Skills?

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Transcription:

CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track.

Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014 School Year 1 P a g e

Table of Contents Executive Summary...3 IT Essentials (Freshman Year)...4 Fall & Spring IT Essentials 1 & 2 (1 Credit) CompTIA A+...4 Suggested Student Learning Outcomes...4 Cyber Defense I & II (Sophomore Year)...5 Fall Computer Networks (1/2 Credit) CompTIA Network+...5 Spring Advanced Computer Networks Hardening Basics (1/2 Credit)...5 Suggested Student Learning Outcomes...5 Programming and Data Structures I & II (Junior Year)...6 Fall Programming and Data Structures I (1/2 Credit)...6 Spring Advanced Programming JAVA (1/2 Credit)...6 Suggested Student Learning Outcomes...6 System Admin I & II (Junior Year)...7 Fall System Administration I (1/2 Credit)...7 Spring System Administration II (1/2 Credit)...7 Suggested Student Learning Outcomes...7 Ethics & Survey of Programming Languages (Senior Year)...8 Fall Skills for Computing Professionals Ethics (1/2 Credit)...8 Spring Internship or Senior Project (1/2 Credit)...8 Suggested Student Learning Outcomes...8 Cybersecurity Essentials (Senior Year)...9 Fall Survey of Programming Languages (1/2 Credit)...9 Spring System Penetration Testing (1/2 Credit)...9 Suggested Student Learning Outcomes...9 Additional recommended courses of studies... 10 Introduction to Logic... 10 Introduction to Statistics... 10 Design and Analysis of Algorithms... 10 2 P a g e

Executive Summary In 2009 I started developing the Advanced Cyber Security Track. I researched what fundamental skills industry was looking for in entry level candidates. What certificates did industry accept as validation for those skills? What courses best developed the fundamental skills industry was looking for and prepared students for certifications that industry accepted. What sequence of those courses logically developed those skills, built a strong foundation, and prepared students for certifications. What course materials best facilitated instruction and learning in those courses. Lastly, what instructional methods were best for those courses? The end result is the Advanced Cyber Security Track. -Mike Miklich, Cyber Security Program Founder 3 P a g e

IT Essentials (Freshman Year) Fall & Spring IT Essentials 1 & 2 (1 Credit) CompTIA A+ This course is an overview of computer architecture, which stresses the underlying design principles and the impact of these principles on computer performance. General topics include design methodology, processor design, control design, memory organization, system organization, and parallel processing. We will be using the CompTIA A+ book for the instructional material, lab exercises and quizzes. It is suggested students be required to pass the CompTIA A+ practice certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program. Suggested Student Learning Outcomes CompTIA A+ Certification Testout A+ Certification 4 P a g e

Cyber Defense I & II (Sophomore Year) CCA CYBER SECURITY TRACK 2013-2014 Fall Computer Networks (1/2 Credit) CompTIA Network+ This course is an introductory look at computer communication from an engineering perspective. It will focus on the principles of computer communication and the basic concepts in the architecture of computer networks. As an introductory course, it covers a broad set of concepts and implementations, addressing both theory and practice, using the layered model of computer communications. Labs are used to reinforce concepts and develop practical networking skills. We will be using CompTIA Network+ book for the instructional material, lab exercises and quizzes. It is suggested students be required to pass the Network + practice certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program. Spring Advanced Computer Networks Hardening Basics (1/2 Credit) This course proposes to introduce the student to the identification of vulnerabilities, forms of attack, appropriate countermeasures, and the detection and defense of the same. Tools and techniques for the securing of hardware, software and data, including physical security are covered. The issues and facilities available to both the intruder and administrator will be examined and evaluated with appropriate exercises to illustrate their effect. The textbook used for this course is All In One CompTIA Security+, with labs to support the learning process. Suggested Student Learning Outcomes CompTIA Network+ Certification Testout Network Certification CompTIA Security+ Certification Testout Security Certification 5 P a g e

Programming and Data Structures I & II (Junior Year) Fall Programming and Data Structures I (1/2 Credit) Using the C++ programming language, this course introduces algorithmic problem solving, basic control and data structures, and procedural abstraction. Topics include language syntax and semantics, arithmetic expressions, operators, functional decomposition, functional calls and parameters, file input and output, identifier scope and lifetime, switch and loop structures, array processing, strings, searching and sorting. The class will use Starting out with C++ textbook, and be instructor led, with labs. Spring Advanced Programming JAVA (1/2 Credit) The Object-Oriented Programming course is a study of concepts, terminology, and methodologies used in object-oriented systems, languages, and applications. Students will design and implement software systems using object-oriented analysis and design techniques. The purpose of this course is to develop a thorough understanding of object-oriented (OO) design, systems, and applications. The lecture portion of the course will emphasize both OO design concepts and language specific applications. Programming assignments will provide students with experience in an object-oriented programming language, namely JAVA. Also, comparisons will be made to OO design concepts in C++. The textbook used for this course will be Java for the Absolute Beginner Suggested Student Learning Outcomes C++ Portfolio JAVA Portfolio 6 P a g e

System Admin I & II (Junior Year) CCA CYBER SECURITY TRACK 2013-2014 Fall Computer Systems Technology I (1/2 Credit) System Administration I topics focus on Microsoft Windows 2008. This course is designed to provide students with essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, such as installing a standalone system, file systems authentication, and user support services are explored. Topics will include security issues, user and group administration, active directory services, DHCP, DNS, SSH, backup and restoration strategies and techniques, integrated mass storage technologies and alternative client technologies. The class will use Configuring Windows server 2008 Active Directory textbook, and be instructor led with, with labs delivered through the Microsoft IT Academy E-learning suite. Spring Computer Systems Technology II (1/2 Credit) System Administration II topics focused on the Linux operating system. This course is designed to provide students with essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, such as installing a standalone system, file systems authentication, and user support services are explored. Topics will include security issues, user and group administration, directory services, DHCP, DNS, SSH, electronic system update and maintenance, backup and restoration strategies and techniques, integrated mass storage technologies and alternative client technologies. The class will use the textbook A Practical Guide to Ubuntu Linux, be instructor led, with labs. Suggested Student Learning Outcomes MCITP Exam 70-646 or MTA Windows Fundamentals and MTA Server Fundamentals CompTIA Linux+ 7 P a g e

Ethics & Survey of Programming Languages (Senior Year) Fall IT Fundamentals - Skills for Computing Professionals Ethics (1/2 Credit) The Skills for Computing Professionals will focus on the professional skills that computer scientists will need to be successful in their careers and lives. There are two key areas of study, communication skills needed by computer scientists and their ethical responsibilities. Communication skills will include writing and giving oral presentations about computer science topics and life skills. Ethical issues will be explored from a computer science perspective. Spring Internship or Senior Project (1/2 Credit) The students will intern and journal their productivity, meeting as a class on a weekly basis to discuss their experiences. If no internship program is available students will work on a senior project Suggested Student Learning Outcomes Comprehensive Computer Scientist Ethical Responsibilities Report Internship or Senior Project 8 P a g e

Cybersecurity Essentials (Senior Year) CCA CYBER SECURITY TRACK 2013-2014 Fall IT Programming - Survey of Programming Languages (1/2 Credit) The Survey of Programming Languages course is a collection of selected programming languages for students familiar with programming. Students will write programs in a broad variety of languages, with an emphasis on Python. Students at the conclusion of this course will be familiar with Ruby, Perl, XHTML and Python. Textbooks used for this course will include Ruby Programming for the absolute beginner, Perl Programming for the absolute beginner, Python Programming for the absolute beginner and HTML, XHTML, & CSS for the Absolute Beginner. Spring IT Programming - System Penetration Testing (1/2 Credit) This class will immerse the students into a hands-on environment where they will be shown how to conduct penetration testing. They will be exposed to an entirely different way of achieving optimal information security posture in their organization. They will scan, test, penetrate and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others. EC-Council textbook on CEHv8 will be used in this course. Suggested Student Learning Outcomes Python, Ruby, and Perl Portfolios CEH Certification 9 P a g e

Additional recommended courses of studies Introduction to Logic Study of correct reasoning, including the recognition, analysis, and criticism of arguments; relevant topics include informal fallacies, syllogistic reasoning, and systems of deduction. Each one of us wants to think clearly and correctly. Logic helps us to do this by studying the forms that valid reasoning takes. This course will treat both informal and formal logic. We will cover common rhetorical fallacies, classical syllogistic logic, and propositional logic. The course aims to provide students with the tools needed to improve their critical thinking and inference skills. Introduction to Statistics Statistics has become known as the mathematical tool or approach for analyzing data in order to draw reliable conclusions. This course will consider the most useful statistical methods; identify the statistical methods most widely used in education, psychology, and the social sciences; and study the mathematical formulas that are used in statistical applications. Prerequisite: MTH 113 or MTH 123. The textbook used for this course will be Statistics for the Utterly Confused. Design and Analysis of Algorithms In this course you will learn several fundamental principles of algorithm design: divide-andconquer methods, graph algorithms, practical data structures (heaps, hash tables, search trees), randomized algorithms, and more. 10 P a g e

For more information about the organization we partner with (iforce) and the Advanced Track, visit www.iforce.me