|  | Oct 31, 2025 |  |  | 
	     
			
		  	|  | 
              
                | CIS 490 - CIS Internship in Cyber Design & Implementation10 CreditsIn this course, students create business scenarios, cyber situations, design and build the network architecture and perform threat analysis for the regional cyber competition. The best scenario will be voted on and implemented for the competition. The competition is meant to be real world for the competitors. Having to design a business network for use in a competition gives students an in-depth knowledge of what can go wrong and network vulnerabilities. This course can be taken in lieu of or in combination with CIS 480 for a minimum of 5 credits and maximum of 10 credits total over the course of the BAS in Cybersecurity and Forensics.
 
 Instructor Permission Required Yes
 Program Admission Required Yes Admitted Program BAS - CIS
 Course Note This course provides a practical alternative to industry internship.
 FeesCF HD
 
 Quarters Typically Offered
 Summer Day
 Fall Day
 Winter Day
 Spring Day
 
 Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
 Active Date 20190619T15:16:23
 
 Grading Basis Decimal Grade
 Variable Credit Yes Range 1-10
 OEE Yes
 Class Limit 99
 Contact Hours:     Independent Studies 300
 Total Contact Hours 300
 Degree Distributions:
 ProfTech Course Yes
 Restricted Elective Yes
 Course Outline
 
 
	What are the components of a cyber competition or invitational?
	
		Understanding the National Initiative for Cybersecurity Education frameworkPast competitionsCommon business scenarios and network architectureResearch of existing and legacy operating systems
	
		Known VulnerabilitiesKnown exploitsWindows, Linux, Macintosh, otherResearch of common web based vulnerabilitiesResearch of common mobile vulnerabilitiesService Level AgreementsCommon Business practicesLeadershipMeeting DeliverablesCurrent cyber threats 
 Student Learning Outcomes
 Design a network, with security measures, vulnerabilities, etc. for chosen scenario
 
 Select and apply the parts of the NICE standards to the competition
 
 Incorporate known vulnerabilities and exploits of existing and legacy operating systems along with web based applications into the competition network design
 
 Exploit common mistakes made by network administrators and users
 
 Design a service level agreement for a website, email service, cloud service, etc.
 
 Design and test business injects to demonstrate compliance with various standards such as PCI or HIPAA which may affect network design or business decisions
 
 Perform assigned tasks in a friendly and courteous manner and accept feedback
 
 Communicate effectively with individuals and in a team environment
 
 Demonstrate successful work habits and attitudes reflecting best practices in the workplace
 
 Analyze problems and choose appropriate solutions, seeking clarification when necessary
 
 
 
 
  Add to Portfolio (opens a new window) |  |