CYBR 1101: Cybersecurity Fundamentals
Effective date
September 2024
Department
Cybersecurity PDD
School
Continuing Studies
Description
In this course, students will be introduced to cybersecurity and why it is important for organizations. Students will learn about key cybersecurity concepts, threats and vulnerabilities, and the concept of least privilege. Students will learn fundamental terminology related to cybersecurity and be introduced to the primary roles and responsibilities related to security for different members of an organization.
Year of study
1st Year Post-secondary
Course Learning Outcomes
Upon successful completion of this course, students will be able to:
- Explain the roles and responsibilities related to cybersecurity within an organization
- Differentiate between threats and vulnerabilities
- Identify characteristics of the most common cybersecurity attacks and relevant mitigation strategies
- Describe hardening a networked environment against attacks
- Recognize security incidents and communicate potential impacts and responses
- Recognize the security risks associated with the System Development Lifecycle (SDLC)
- Explain the key objectives of security - Confidentiality, Integrity and Availability in the context of protecting an organization from cybersecurity threats
- Explain Authentication, Authorization, and Accounting (AAA), and how each supports controlling user access to computer resources, enforcing policies and auditing usage.
- Discuss how key security concepts apply to evolving IT environments, including emerging technologies
Prior Learning Assessment & Recognition (PLAR)
PLAR is assessed through:
1) Challenge exam (may involve scenario-based assessment), or a portfolio review showcasing experience related to cybersecurity, or proof of active professional certification in CISSP or CISM; and
2) an interview with the department leader or designate
Hours
Lecture, Online, Seminar, Tutorial: 37.5
Clinical, Lab, Rehearsal, Shop, Kitchen, Simulation, Studio: 12.5
Total Hours: 50
Instructional Strategies
Instructional strategies include classroom lectures, demonstrations, group discussions, computer lab and/or hands-on practical exercises.
Grading System
Letter Grade (A-F)
Evaluation Plan
|
Type
|
Percentage
|
Assessment activity
|
|
Assignments
|
10-20
|
Assignments involving practical exercises
|
|
Assignments
|
10-15
|
Case study activities
|
|
Assignments
|
10-20
|
Presentation(s)
|
|
Quizzes/Tests
|
10-20
|
Quizzes
|
|
Final Exam
|
20-30
|
Final exam
|
Course topics
- Confidentiality, Integrity, and Availability (CIA) Triad
- Authentication, Authorization, and Accounting (AAA)
- Principle of Least Privilege (POLP)
- Defense in Depth
- Firewalls
- Intrusion Prevention and Detection System (IDS, IPS)
- OWASP Top 10
- Hardening
- Vulnerabilities and threats
- Viruses
- Roles and responsibilities related to security
- Access control and permissions
- Penetration testing
- Security operations centre
- Incident recognition and response
Notes:
- Course contents and descriptions, offerings and schedules are subject to change without notice.
- Students are required to follow all College policies including ones that govern their educational experience at VCC. Policies are available on the VCC website at:
https://www.vcc.ca/about/governance--policies/policies/.
- To find out if there are existing transfer agreements for this course, visit the BC Transfer Guide at https://www.bctransferguide.ca.