Aug 08, 2020  
2017-2018 Catalog 
2017-2018 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CIS 490 - Cyber Design & Implementation Internship

10 Credits
In this course, students create business scenarios, cyber situations, do network design and perform threat analysis for the regional cyber competition. The best scenario will be voted on and implemented for the competition. The competition is meant to be real world for the competitors. Having to design a business network for use in a competition gives students an in-depth knowledge of what can go wrong and network vulnerabilities. This course can be taken in lieu CIS 480 for a minimum of 5 credits total over the course of the BAS in Cybersecurity and Forensics.

Instructor Permission Required Yes
Program Admission Required Yes Admitted Program BAS - CIS
Course Note This course provides a practical alternative to industry internship
Fees CF

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 2016-05-04

Grading System Decimal Grade
Variable Credit Yes Range 1-10
Class Limit 99
Contact Hours: Lecture 0 Lab 0 Worksite 0 Clinical 0 Other 300
Total Contact Hours 300
Degree Distributions:
Course Outline
I. What are the learning objectives for students in a cyber competition?

a. Understanding the National Initiative for Cybersecurity Education framework

b. Past competitions

II. Common business scenarios and network architecture

III. Research of existing and legacy operating systems

a. Known Vulnerabilities

b. Known exploits

c. Windows, Linux, Macintosh, other

IV. Research of common web based vulnerabilities

V. Research of common mobile vulnerabilities

VI. Service Level Agreements

VII. Common Business practices

VIII. Leadership

IX. Meeting Deliverables

X. Current cyber threats

Student Learning Outcomes
Explain and describe the learning objectives for students in a cyber competition

Describe the parts of the NICE standards

Demonstrate known vulnerabilities and exploits of existing and legacy operating systems

Demonstrate known vulnerabilities of web based applications

Demonstrate knowledge of common web based attacks such as SQL injections

Demonstrate common mistakes made by network administrators

Design a service level agreement for a website, email service, cloud service, etc.

Design a common network for chosen scenario

Research the network designs, security measures, needed for various businesses such as a real estate office, hospital, banks, etc.

Demonstrate how compliance with various standards such as PCI or HIPAA may affect network design

Add to Portfolio (opens a new window)