You are on page 1of 6

Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading

Policies Professional Certifications

Cybersecurity: Security for Cyberspace

Dilip Sarkar

Department of Computer Science


University of Miami

Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Outline I

1 Lecture 1: Cybersecurity Topics, Class and Grading Policies


Lecture 1: Five Questions

2 Outline of the Course Contents


Part I: An Introduction to Cyberspace
Part II: Information in Cyberspace
Part III: Cryptography for Protecting Digital Information
Part IV: Social Engineering, Phishing, and Cybersecurity Laws and
Regulations

3 Class and Grading Policies

4 Professional Certifications
Summary
Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Lecture 1: Five Questions

What is Cybersecurity?
What is Cyberspace?
What is digital information and where can it be found?
What are some tools for securing digital information?
What are some Laws and Regulations for punishing malicious actors?

Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Part I: An Introduction to Cyberspace

Architecture of the Internet, Networks, and World-Wide-Web


Cyberspace and Security Problem in Cyberspace
Malicious Actors and Their Acts in Cyberspace
Defense Against Malicious Acts
Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Part II: Information in Cyberspace

Information types: primary and derived


Digital presence and Information footprint of a typical person in a day
Five (CIA +2) Pillars of Information Security
Malware: Traditional and Advanced
Attacks by malware and protection against them

Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Part III: Cryptography for Protecting Digital Information

Cryptology = Cryptography + Cryptanalysis


Applications of Cryptography in Everyday Life
Blockchain Technology and its Applications
Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Part IV: Social Engineering, Phishing, and Cybersecurity


Laws and Regulations

Malicious Act: Social Engineering


Malicious Act: Phishing
Regulations and Law in USA
Regulations and Law in the rest of the World

Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Class and Grading Policies


Attendance is very Important, because
No textbook is available
Materials are drawn from different sources
10% of the grade depends on your participation
attendance earns some participation points
No midterms or final exam
HW 45% – One homework set each week; due dates are on the schedule
You will have one week to complete
Upload HW sets at Blackboard by deadline, late HW sets are not graded
Collaboration is encourage, but please don’t copy from each other
Review of topics taught in the class 30% –
Three parts — 10 % for each part; due dates are on the class schedule
Review is not copies of my slides and/or notes. It is a cohesive but brief
description of all topics taught;
Be concise but comprehensive
Each review is about 2,000 words long
Project proposal 5%
Project report 10%
Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Professional Certifications I

Good paying jobs are available all over the world, including U.S.A.
Cybersecurity standards and requirements for U.S. Department of Defense
(DoD) described in two directives
DoD Directive 8570.01 describes, among others, information security
requirements for DoD
U.S. DoD/Military Directive 8140
Certification programs have been developed and offered to meet both directives
Vendor-Neutral Professional Certifications
(ISC)2 : International Information Systems Security certification Consortium,
Inc is one of the most respected global certification organization
(ISC)2 offers seven main credentials and three additional credentials
Global Information Assurance Certification (GIAC) offer about 30 credentials
Certified Internet Webmaster (CIW) offers several credentials
CompTIA offers CompTIA Security+ certification
There more now, but (ISC)2 credentials are most widely accepted and
respected

Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Professional Certifications II

Vendor-Specific certifications are offered by


Cisco Networks
Juniper Networks
and a few other companies
Cisco Systems
Juniper Networks
Questions?
Outline Lecture 1: Cybersecurity Topics, Class and Grading Policies Outline of the Course Contents Class and Grading Policies Professional Certifications

Summary

Asked five questions on the Internet, World-Wide Web, Cyberspace, and


Cybersecurity
Presented an overview of the course contents
Discussed class policies and grading policies
Discussed possible professional certifications for very-high paying jobs
Question?

You might also like