Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


Introduction To Cybersecurity (CSC-280)


Semester: Fall 2024
Number: 0145-280-001
Instructor: Sung Kim
Days: Monday Wednesday 2:25 pm - 3:40 pm
Note: Traditional In-Person Class
Location: Garden City - Levermore Hall 305
Credits: 3
Status: This Course is Filled to Capacity
Course Materials: View Text Books
Description:

Students will be provided with a broad introduction to cybersecurity. Students will learn about common cyber attacks and their effects, who commits them, and why they occur. Students will learn how to detect such attacks. Students will gain up-to- date knowledge, based on a solid theoretical foundation.

Learning Goals:   Students will:• Learn how to read and communicate about cybersecurity. This will be done through the interpretation of news reports concerning cybersecurity breaches, have relevant discussions about them with novices as well as subject-matter experts, and provide suggestions as to how to mitigate root causes.• Define, explain and apply the concepts of authentication, access control and audit in a controlled environment. • Define cryptography, be able to identify and explain elements that are crucial in implementing cryptographic solutions, and have be able to explain basic cryptographic applications.• Explore the role of cybersecurity in current organizations, and be able to have meaningful discussions as to how cybersecurity is managed and defensive strategies.

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

Prerequisites:

» View Other Sections of this Course


« Back to Search Results

 
Apply Now
Request Information