CSE 5471
Transcript Abbreviation:
Intr Cybersecurity
Course Description:
Introduction to cybersecurity. Technical fundamentals of data, software, component, network, and system security. Cybersecurity from an organizational and societal view point, including human factors.
Course Levels:
Undergraduate (1000-5000 level)
Graduate
Designation:
Elective
General Education Course:
(N/A)
Cross-Listings:
Cross-listed in ECE 5561.
Credit Hours (Minimum if “Range”selected):
3.00
Max Credit Hours:
(N/A)
Select if Repeatable:
Off
Maximum Repeatable Credits:
(N/A)
Total Completions Allowed:
(N/A)
Allow Multiple Enrollments in Term:
No
Course Length:
14 weeks (autumn or spring)
Off Campus:
Never
Campus Location:
Columbus
Instruction Modes:
In Person (75-100% campus; 0-24% online)
Hybrid Class (25-74% campus; 25-74% online)
Distance Learning (100% online)
Prerequisites and Co-requisites:
Prereq: Jr, Sr, or Grad standing, or permission of instructor.
Electronically Enforced:
No
Exclusions:
Not open to students with credit for ECE 5561.
Course Goals / Objectives:
Become familiar with fundamental cybersecurity concepts, technologies and practices, and develop a foundation for further study in cybersecurity.
Become familiar with fundamentals of data security.
Become familiar with fundamentals of software security.
Become familiar with fundamentals of connection/network security.
Check if concurrence sought:
No
Contact Hours:
Topic | LEC | REC | LAB | LAB Inst |
---|---|---|---|---|
Basic concepts and definitions. Historical context. Cybersecurity frameworks. | 3.0 | 0.0 | 0.0 | 0 |
Data Security: Basic cryptography concepts, methods for data integrity and authentication, information storage security. | 7.0 | 0.0 | 0.0 | 0 |
Software security: software design with security requirements, testing, configuration management. | 5.0 | 0.0 | 0.0 | 0 |
Component security: Design, procurement, analysis, and maintenance of tangible components that are integrated into larger systems. | 4.0 | 0.0 | 0.0 | 0 |
Connection security: Security for networked systems, secure transmission models, common types of connection and transmission attacks. | 5.0 | 0.0 | 0.0 | 0 |
System security: System thinking, common system architectures, system management, access, control, and testing. | 4.0 | 0.0 | 0.0 | 0 |
Human security: identity management; personal awareness, understanding and compliance; human behavioral factors; personal data privacy and security. | 3.0 | 0.0 | 0.0 | 0 |
Organizational security: governance and policy strategies for organizations; cybersecurity risk management; legal and regulatory issues. | 3.0 | 0.0 | 0.0 | 0 |
Societal security: cybercrime, cyberlaw, cyberethics, cyberpolicy, privacy. | 3.0 | 0.0 | 0.0 | 0 |
Project presentations on complementary topics: hardware security, infrastructure security, cryptocurrencies etc. | 5.0 | 0.0 | 0.0 | 0 |
Total | 42 | 0 | 0 | 0 |
Grading Plan:
Letter Grade
Course Components:
Lecture
Grade Roster Component:
Lecture
Credit by Exam (EM):
No
Grades Breakdown:
Aspect | Percent |
---|---|
Assignments | 30% |
Midterm Exam | 30% |
Final project and presentation | 40% |
Representative Textbooks and Other Course Materials:
Title | Author | Year |
---|---|---|
No Textbooks and Other Course Materials Entered. |
ABET-CAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Some contribution (1-2 hours) | Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. |
2 | Substantial contribution (3-6 hours) | Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. |
3 | Some contribution (1-2 hours) | Communicate effectively in a variety of professional contexts. |
4 | Substantial contribution (3-6 hours) | Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles |
6 | Substantial contribution (3-6 hours) | Apply computer science theory and software development fundamentals to produce computing-based solutions. |
ABET-ETAC Criterion 3 Outcomes:
(N/A)
ABET-EAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Some contribution (1-2 hours) | an ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics |
2 | Substantial contribution (3-6 hours) | an ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors |
3 | Some contribution (1-2 hours) | an ability to communicate effectively with a range of audiences - pre-2019 EAC SLO (g) |
4 | Substantial contribution (3-6 hours) | an ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts |
7 | Substantial contribution (3-6 hours) | an ability to acquire and apply new knowledge as needed, using appropriate learning strategies |
Embedded Literacies Info:
Attachments:
(N/A)
Additional Notes or Comments:
(N/A)
Basic Course Overview:
CSE_5471_basic.pdf
(10.68 KB)