| |
May 01, 2026
|
|
|
|
|
CYS 2020 - MODERN CYBERSECURITY credits: 3.0 Just as technology is constantly evolving, so too must cybersecurity to keep pace with changing trends. In this class, will learn about the changing landscape of cybersecurity, emerging mobile technologies that are likely to be targeted, and new forms of cyber-attacks being launched. By the end of the course, will be able to implement the most up-to-date practices in cybersecurity in order to protect against attacks. This online class has optional live sessions. Wireless Fundamentals: It’s important to gain a fundamental understanding of how wireless networks work in order to safeguard mobile devices from cyber-attacks. Students will learn about the different wireless network topologies, standards, and antennas that exist. Wireless Revolution: Over the last 30 years, the evolution of wireless devices has been significant. From clunky analog phones to sleek smart devices that people can’t live without, students will learn how these devices and their wireless capabilities have fundamentally changed how people live, work, and interact. Internet of Things: Students will learn how the “wireless” world that we live in where literally everything is connected and remotely controllable has introduced a whole new landscape of security threats and vulnerabilities for IoT devices that enable hackers to potentially lock you out of your house, ransom control of your heating and cooling system, or even take control of a moving vehicle. Mobile Security: Students will learn about the different security models of each of the major mobile platforms-Google Android, Apple iOS, Windows Phone and how these differences may make them more susceptible to malware and other cyber-attacks. Objectives: A) Examine how wireless networks have become a fabric of modern society that provide people with unprecedented accessibility while presenting new security challenges; B) Assess how the need to connect all mobile devices directly to the Internet has introduced a whole new landscape of security threats and vulnerabilities; C) Mitigate modern cybersecurity challenges associated with mobile IoT devices via safeguards and countermeasures; D) Describe the evolution of wireless networks and how they operate; E) Detect threats and safeguard wireless networks from cyber-attacks; F) Explain the transformational nature of mobile IoT devices; G) Describe the primary security and privacy risks posed by mobile IoT technologies. Protect mobile IoT devices from cyber-attacks; H) Analyze real-world mobile IoT cyber-attack scenarios; I) Perform reconnaissance to detect unsecured wireless networks; J) Scan the Internet to detect IoT devices that are capable of being remotely controlled by cyber criminals; K) Conduct a proximity scan to detect Bluetooth IoT devices that are susceptible to cyber-attacks; L) Perform a cybersecurity threat analysis for IoT devices, smartphone devices, mobile apps, WiFi networks, and Bring Your Own Devices (BYODs); M) Present complex security information to non-technical personnel.
Method of Evaluation: Onboarding Assignments 50 5%; Discussions 150 (3 x 50) 15%; Quizzes 200 (4 x 50) 20%; Labs 300 (3 x 100) 30%; Final Project (Part 1: Proposal, Part 2: Draft, Part 3: Final, Presentation) 300 (50, 100, 150) 30%.
Add to Favorites (opens a new window)
|
|