Course Syllabus

Course Description

This course code has changed from CIT 270 to CYBER 301. You may occasionally see references to the old course code or title.

The purpose of the course is to provide the student with an overview of the field of Information Security and Assurance. Students will be exposed to a spectrum of security activities, methods, methodologies, and procedures. This course offers a comprehensive guide for anyone wishing to take the CompTIA Security+ SY0-601 Certification Exam. It provides an introduction to the fundamentals of network security, including:

  • attacks, threats, and vulnerabilities;
  • architecture and design;
  • implementation;
  • operations and incident response; and
  • governance, risk, and compliance.

The course covers new topics in network security as well, including psychological approaches to social engineering attacks, web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security.

Textbook

The course materials are available in the Course Materials List.

Mark Ciampa, Security+ Guide to Network Security Fundamentals, Seventh Edition (e-textbook). Cengage Learning, 2022. ISBN 978-0-357-42440-7

(Optional alternative: printed textbook) Mark Ciampa, Security+ Guide to Network Security Fundamentals, Seventh Edition. Cengage Learning, 2022. ISBN 978-0-357-42437-7

Compare prices for your textbooks through the University Store Price Comparison site (Links to an external site.). They will show you all of the options from the University Store plus several online options to help you find the best price.

BYU-Idaho Learning Model

"The challenge before us is to create even more powerful and effective learning experiences in which students learn by faith. This requires, but is more than, teaching by the Spirit. To learn by faith, students need opportunities to take action. Some of those opportunities will come where students lead and teach one another and participate broadly. Some of them will come in the classroom, where prepared students, exercising faith, step out beyond the light they already possess, to speak, to contribute, and to teach one another. It is precisely in that moment of faith that (the) 'calling up' and 'linking' of personal effort to the Spirit occurs. It is in that moment that the Spirit teaches." (Kim B. Clark, "Inaugural Response," Brigham Young University - Idaho, October 11, 2005)

Principles

  1. Exercise faith in Christ as a principle of action and power
  2. Understand that true teaching is done by and with the Holy Ghost
  3. Lay hold upon the word of God as found in the holy scriptures and in the words of the prophets in all disciplines
  4. Act for themselves and accept responsibility for learning and teaching
  5. Love, serve and teach one another

Software and Computer Ethics

The use of the BYU-Idaho network, systems, and data imposes responsibilities and obligations upon the students to use these computer components in an ethical manner and in accordance with the guidelines found in the BYU-Idaho Honor Code. Students are to access only data and files that are owned by them, or explicit authorization has been given by the instructor for their use. Copyrighted material must be used in accordance with copyright law and applicable license agreements followed.

Attempting to circumvent or subvert system security measures or engaging in any activity that causes harm to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files are considered inappropriate use. Violators are subject to disciplinary actions as prescribed by BYU-Idaho Policy and may also be prosecuted under applicable local, state, or federal civil or criminal law.

Topics Covered

  • Part 1, Security Fundamentals
    • Introduction to Security
    • Threat Management and Cybersecurity Resources
  • Part 2, Endpoint Security
    • Threats and Attacks on Endpoints
    • Endpoint and Application Development Security
    • Mobile, Embedded, and Specialized Device Security
  • Part 3, Cryptography
    • Basic Cryptography
    • PKI and Cryptographic Protocols
  • Part 4: Network Security
    • Networking Threats, Assessments, and Defenses
    • Network Security Appliances and Technology
    • Cloud and Virtualization Security
    • Wireless Network Security
  • Part 5: Enterprise Security
    • Authentication
    • Incident Preparation, Response, and Investigation
    • Cybersecurity Resilience
    • Risk Management and Data Privacy

Course Outcomes

Upon successful completion of this course, students will be able to:

  1. Apply cybersecurity principles to their daily life.
  2. Demonstrate competency in the following by passing the CompTIA Security+ Industry certification (or similar) exam:
    • attacks, threats, and vulnerabilities;
    • architecture and design;
    • implementation;
    • operations and incident response; and
    • governance, risk, and compliance.
  3. Research and present cybersecurity concepts in a professional manner

Grading

Grading
Participation - Reflection 15%
Labs and Hands On Projects 30%
Case Project 20%
Exams 20%
Reading and Quizzes 15%

Grading Scale

Grading Scale
Grade Percentage Range
A 100 - 93
A- 92.9 - 90
B+ 89.9 – 87
B 86.9 – 84
B- 83.9 – 80
C+ 79.9 – 77
C 76.9 – 74
C- 73.9 – 70
D+ 69.9 – 67
D 66.9 – 64
D- 63.9 - 60
F >60

Incentive exceptions: if you receive a passing grade on the CompTIA Security+ SY0-601 exam before the end of the semester, you are guaranteed a minimum of a 'C' grade in the course. If you receive a passing grade on the CompTIA Security+ SY0-601 exam before the end of the semester, and you also satisfactorily assist your project group to complete your team projects, you will pass the course with an exceptional 'A' grade.

Late Work

Late work will not be accepted.

Academic Dishonesty

Cheating in any form is unacceptable conduct and can lead to consequences, not limited to, expulsion from the class or worst.  

Disability

Title IX of the Education Amendments of 1972 prohibits sex discrimination against any participant in an education program or activity that receives federal funds, including Federal loans and grants. Title IX also covers student-to-student sexual harassment. If you encounter unlawful sexual harassment or gender-based discrimination, please contact the Personnel Office at 208-496-1130.

BYU-Idaho is committed to providing a working and learning atmosphere that reasonably accommodates qualified persons with disabilities. Reasonable academic accommodations are reviewed for all students who have qualified documented disabilities. Services are coordinated with the student and instructor by BYU-Idaho Disability Services. If you need assistance or feel you have been unlawfully discriminated against on the basis of disability, you may seek resolution through established policy and procedures.

If you have any disability that may impair your ability to complete this course successfully, please contact Disability Services as soon as possible, preferably before the beginning of the semester, in order to insure that you receive appropriate accommodations.

Disability Services Contact Information:

This course includes required synchronous meetings. If you are currently registered with the Disability Services Office and need an interpreter or transcriber for these meetings, please contact the deaf and hard of hearing coordinator at (208) 496-9219.

E-Mail

All students are requested to use their BYU-Idaho email account. If you have any questions about the course or need assistance, please contact me via e-mail or telephone any time.

Course Summary:

Date Details Due