|
Jan 15, 2025
|
|
|
|
CIS 490 - CIS Internship in Cyber Design & Implementation10 Credits In this course, students create business scenarios, cyber situations, design and build the network architecture and perform threat analysis for the regional cyber competition. The best scenario will be voted on and implemented for the competition. The competition is meant to be real world for the competitors. Having to design a business network for use in a competition gives students an in-depth knowledge of what can go wrong and network vulnerabilities. This course can be taken in lieu of or in combination with CIS 480 for a minimum of 5 credits and maximum of 10 credits total over the course of the BAS in Cybersecurity and Forensics.
Instructor Permission Required Yes Program Admission Required Yes Admitted Program BAS - CIS Course Note This course provides a practical alternative to industry internship. FeesCF HD
Quarters Typically Offered Summer Day Fall Day Winter Day Spring Day
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20190619T15:16:23
Grading Basis Decimal Grade Variable Credit Yes Range 1-10 OEE Yes Class Limit 99 Contact Hours: Independent Studies 300 Total Contact Hours 300 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- What are the components of a cyber competition or invitational?
- Understanding the National Initiative for Cybersecurity Education framework
- Past competitions
- Common business scenarios and network architecture
- Research of existing and legacy operating systems
- Known Vulnerabilities
- Known exploits
- Windows, Linux, Macintosh, other
- Research of common web based vulnerabilities
- Research of common mobile vulnerabilities
- Service Level Agreements
- Common Business practices
- Leadership
- Meeting Deliverables
- Current cyber threats
Student Learning Outcomes Design a network, with security measures, vulnerabilities, etc. for chosen scenario
Select and apply the parts of the NICE standards to the competition
Incorporate known vulnerabilities and exploits of existing and legacy operating systems along with web based applications into the competition network design
Exploit common mistakes made by network administrators and users
Design a service level agreement for a website, email service, cloud service, etc.
Design and test business injects to demonstrate compliance with various standards such as PCI or HIPAA which may affect network design or business decisions
Perform assigned tasks in a friendly and courteous manner and accept feedback
Communicate effectively with individuals and in a team environment
Demonstrate successful work habits and attitudes reflecting best practices in the workplace
Analyze problems and choose appropriate solutions, seeking clarification when necessary
Add to Portfolio (opens a new window)
|
|