University of Idaho
“A Modular Approach to Cybersecurity Learning: Enhanced with DARPA’s DECREE for Cybersecurity Laboratory Exercises.”
The course materials described below are accessible via the Cyber Curriculum Library - online portal. CLICK HERE to LOGIN.
Topics and Subtopics include:
“Cybersecurity Principles” with emphasis on the McCumber Cube, classes of threats, threat surfaces, threat models, mitigations, mitigation strategies, encompassing classical technologies, management, policies, procedures, classic cybersecurity case studies, different system configurations including cell phones, laptops, workstations, and IoT devices, local networks, enterprise-level network and the Internet.
“Network Security” with emphasis on the OSI model, network media, network architectures, network devices, network services, network protocols, network topologies, network security issues, elements of cryptographic systems, symmetric and asymmetric algorithms, cryptographic protocols, tools and techniques, cryptographic uses, strengths, weaknesses, modes and issues, firewalls, intrusion detection systems, VPNs, defense in depth network monitoring, minimizing exposure, mission assurance, and network policy development and enforcement.
“Software Vulnerability Analysis” with emphasis on types of software reviews and different classes of vulnerabilities.
And “Development and Acquisition of Secure Software” with emphasis on software development lifecycles, development and specification of cybersecurity requirements in the software development lifecycle, threat assessment, risk assessment, workflow security requirement generation and validation, different types of mitigations for specific threats, mitigation limitations, need for multiple mitigations and interactions between different mitigations.
NCWF Categories included:
NCWF Specialty Areas included:
NCWF KSAs included:
K0001: Knowledge of computer networking concepts and protocols, and network security methodologies.
K0002: Knowledge of risk management processes.
K0003: Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
K0004: Knowledge of cybersecurity and privacy principles.
K0005: Knowledge of cyber threats and vulnerabilities.
Four modules total, with options to be used as add-ons to existing courses, combined into full courses, self-study, or workplace training. Both Windows and Unix platforms required. Modules are suggested to be taught in order, as each modules is specifically for introductory,
intermediate or advanced purposes. Summaries, syllabi, mappings, lesson plans, lecture materials, outcomes, assessments and lab exercises are included. Lab exercises include: network appliance, return oriented programming, data exfiltration, classic security vulnerabilities, and attack recognition. Lab exercises utilize DARPA’s DECREE framework. Module material is editable, allowing for modification, expansion, and enhancement by instructors for their specific audiences. Stories are also incorporated into the curriculum, relating to relevant history and use behavior.