Developing Hands-On Cybersecurity Curriculum with Real-World Case Analysis
Michigan Technological University
[NOT INCLUDED IN SOLICITATION] level.
“Developing Hands-on Cybersecurity Curriculum with Real-World Case Analysis.”
The course materials described below are available via the Cyber Curriculum Library online portal - CLICK HERE TO LOGIN.
Topics and Subtopics include:
“Cyber Ethics” with emphasis on foundational and professional issues in cyber ethics, privacy, security and crime in cyberspace, intellectual property, internet regulation, digital divide and online communities, emerging and converging technologies, national and international laws, regulations, policies, and ethics, and introduction to risk analysis, management and mitigations concepts.
“Cybersecurity I” with emphasis on evolution of information security to cybersecurity, relationships to nations, organizations, society and individuals, exposure to cybersecurity technologies, processes, procedures, analyzing threats, vulnerabilities and risks, developing strategies to mitigate potential cybersecurity issues, web security, email phishing, social engineering, cryptographic tools, intrusion detection, DDoS, firewalls, malware/ransomware, best practices, and policy management.
“Scripting for Automation and Security” with emphasis on scripting in PERL, Python, BASH and Powershell, automating of common system administration and security tasks, focusing on files, network and web communication and database interaction.
“Wireless System Administration” with emphasis on wireless communications, standards and regulations in an enterprise environment, various radio frequency and light communications, IEEE 802.11 regulations and standards, protocols and devices, network implementation, network security, site surveying, software defined radio and wireless signal security analysis.
“Cybersecurity II” with emphasis on information assurance, cryptography and data security, malware analysis, buffer overflow, security audits, cryptographic systems (symmetric and public-key algorithms), public-key certificates (X.509), message authentication, Kerberos, authentication applications, electronic mail security, IP security, and SELinux.[Text Wrapping Break]
And “Digital Forensics” with emphasis on acquisition, preservation, recovery and investigation of the evidence stored in digital devices, detection of how and when a breach occurred, identification of compromised systems, determination of what attackers steal, incident response, and hunting down additional breaches.
NCWF Categories included:
[NOT INCLUDED IN SOLICITATION]
NCWF Specialty Areas included:
[NOT INCLUDED IN SOLICITATION]
NCWF KSAs included:
K0001: Knowledge of computer networking concepts, protocols, and network security methods.
K0002: Knowledge of risk management processes.
K0004: Knowledge of cybersecurity principles.
K0005: Knowledge of cyber threats and vulnerabilities.
[NOT INCLUDED IN SOLICITATION], split between six topics (see Topics and Subtopics). [NOT INCLUDED IN SOLICITATION]. [NOT INCLUDED IN SOLICITATION. Modules are linked, and it is suggested to follow the specified order for proper integration. Curriculum focus on real world examples and dissecting recent high-profile cyber breaches.