This document provides a session plan for an introduction to cybersecurity course. The plan outlines 4 main topics to be covered: [1] cybersecurity attacks concepts and techniques, [2] protecting data and privacy, [3] protecting the organization, and [4] careers in cybersecurity. Each topic includes learning outcomes, date of lecture, timing, and type of learning (theory, lab, or both). Chapter exams will take place from December 26th to January 25th, with final course feedback collected until January 31st.
This document provides a session plan for an introduction to cybersecurity course. The plan outlines 4 main topics to be covered: [1] cybersecurity attacks concepts and techniques, [2] protecting data and privacy, [3] protecting the organization, and [4] careers in cybersecurity. Each topic includes learning outcomes, date of lecture, timing, and type of learning (theory, lab, or both). Chapter exams will take place from December 26th to January 25th, with final course feedback collected until January 31st.
This document provides a session plan for an introduction to cybersecurity course. The plan outlines 4 main topics to be covered: [1] cybersecurity attacks concepts and techniques, [2] protecting data and privacy, [3] protecting the organization, and [4] careers in cybersecurity. Each topic includes learning outcomes, date of lecture, timing, and type of learning (theory, lab, or both). Chapter exams will take place from December 26th to January 25th, with final course feedback collected until January 31st.
S# Topic Name & Description (This part represents the depth
of topic you intend to cover.)
The Need For CyberSecurity+Attacks Concepts &
1 Techniques
2 Protecting your Data & privacy
3 Protecting the Organization
4 will your future be in Cybersecurity
Group Chpater Exams
Final Exams & Course Feedback Detailed Session Plan by Topic
Program : Cisco Networking Academy
Credit hours : Date :
Topic Learning Outcomes (Spell out the
learning outcomes, in bulleted form, for the Date of Lecture Timing students for example After completing this topic, Conductance students will be able to:.)
Explain how a security vulnerability is
exploited.Identify examples of security vulnerabilities.Describe types of malware and their symptoms,methods of 26-Dec-22 11:00 am - 01:00 pm infiltration,methods used to deny service,a blended attack, importance of impact reduction.
Explain how to protect your devices and
network.Describe safe procedures for data maintenance.Describe strong authentication 2-Jan-23 11:00 am - 01:00 pm methods Describe safe online behaviors.
Describe the various types of
firewalls,Describe different types of security appliances,Describe different methods of detecting attacks in real time, Describe methods of detecting malware, 9-Jan-23 11:00 am - 01:00 pm Describe security best practices for organizations. Define the term botnet. Define the term kill chain. Describe the legal and ethical issues facing a 16-Jan-23 11:00 am - 01:00 pm cybersecurity professional Chpater Exams 26-Dec-22 to 25-jan-23 & Course Feedback 25-jan-23 to 31-jan-23 Type of Learning