INSTRUCTIONS
IN THE LINK BELOW IS THE DISCUSSION FOR WEEK 1 USE IT TO HELP WITH THE ASSIGNMENT
In the previous week you identified a topic for your course, along with an overview paragraph.
For this discussion, post your revised overview along with 3–5 objectives for each of the two units for your course. The objectives that you choose should NOT begin with words such as, understand, know how to, learn, words that end in “ing,” or questions.
The objectives need to begin with present tense action verbs that can be assessed. Some examples may be: create, identify, describe, analyze, synthesize, and other words that can be assessed. Refer to
Writing Learning Objectives [PDF]
for more help.
The course that I will be designing for my final project is called “Introduction to Cyber Security Principles”. Cybersecurity has a close relationship with information technology since it is responsible for protection of data, and systems from unauthorized access. In recent years, global threats have sharply increased, and industries are increasingly using digital technologies, therefore, it is vital for IT specialists to learn basic concepts in cybersecurity (Dupuis & Renaud, 2021). It is specifically the goal of this course to equip the students with as much knowledge about cybersecurity so that they will be able to look for threats, manage threats, and apply security in network and computer systems. The course will teach the students the basics which include threat, cryptography, protocols, network, and ethical hacking. Subsequently the students will be taught more about impact of cybercrime on the companies, customers and worldwide security.
The course will be divided into two units that concern generalities that every student should know about cybersecurity. In the first unit, “Threats and Vulnerabilities,” students will be brought through an overview of various classes of cyber threats, such as malware, phishing, denial of service attacks, among others. Students will also be able to understand how threats exist in software, hardware and people, and the measures which can be taken to ensure security. The second unit of the course, “Network Security Fundamentals,” will look more into the concepts of defending network systems. At the end of the term, the students will be able to learn what a firewall is, why it is used, intrusion detection system and encryption protocols used in computer networks (Formosa et al., 2021). They will also learn how to design and manage efficient security that can also address issues of compromise within networks. Students will obtain the substantive knowledge of the importance as well as fundamental concepts and processes required to protect IT systems in practical conditions, as well as fundamental knowledge that will allow to continue the study of cybersecurity or get a job in this area.
References
Dupuis, M., & Renaud, K. (2021). “Scoping the ethical principles of cybersecurity fear appeals.” Ethics and Information Technology, 23(3), 265-284. https://doi.org/10.1007/s10676-020-09560-0Links to an external site.
Formosa, P., Wilson, M., & Richards, D. (2021). A principlist framework for cybersecurity ethics. Computers & Security, 109, 102382. https://doi.org/10.1016/j.cose.2021.102382Links to an external site.