\setcounter{numTAs}{0} \setcounter{totalSections}{2} \def\secNum{{"001","DL1",""}} \def\tenSchFileName{{"","",""}} \def\classTime{{"W from 06:10 pm to 08:50 pm in Center for Engr. Educ. \& Res. 109.","W from 06:10 pm to 08:50 pm Location: TBA",""}} \def\classRm{{"CEER 109","",""}} \def\classLive{{"","",""}} \def\classInstructor{{"Gerard J. Mayer","Gerard J. Mayer",""}} \def\classInstrContact{{"","",""}} \def\classInstrOffHrs{{"","",""}} \def\classInstrLive{{"","",""}} \def\labTime{{"W from 06:10 pm to 08:50 pm in Center for Engr. Educ. \& Res. 109.","W from 06:10 pm to 08:50 pm Location: TBA",""}} \def\labRm{{"","",""}} \def\labLive{{"","",""}} \def\labInstructor{{"Gerard J. Mayer","Gerard J. Mayer",""}} \def\labInstrContact{{"","",""}} \def\labInstrOffHrs{{"","",""}} \def\labInstrLive{{"","",""}} \def\TA{{{""},{""},{""}}} \def\TAEmail{{{""},{""},{""}}} \def\TAOffHrs{{{""},{""},{""}}} \def\TARoom{{{""},{""},{""}}} \newcommand\semester{Spring 2022} \newcommand\rsemester{202230} \newcommand\courseNum{ECE 8484} \newcommand\courseName{Cybersec. Threats and Defense} \newcommand\courseCoordinator{Gerard J. Mayer } \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{1} \newcommand\undergradCourse{0} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\isClassLive{0} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{0} \newcommand\isLabInstrLive{0} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{0} \newcommand\meetingDesc{Example: (Two 75-minute lectures)} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{Special notes on instructor(s), TA(s) go here, if specified} \newcommand\textBookExists{1} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{1} \newcommand\txtBkPublExists{1} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{1} \newcommand\textBookTitle{Fundamentals of Information Systems Security, Third Edition} \newcommand\textBookAuth{David Kim and Michael Solomon} \newcommand\textBookPub{Jones and Bartlett Learning} \newcommand\textBookYr{} \newcommand\textBookISBN{ISBN: 9781284116458} \newcommand\supplMaterials{} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{Malware and cyber threats: computer network defense; software for Data Protection and Privacy, Security Information and Event Management (SIEM), Governance, Risk and Compliance (GRC); trusted computer systems and secure applications; identy and access management including biometrics; next generation security concepts.} \newcommand\preReqs{None} \newcommand\coReqs{None} \newcommand\coreRequirement{Example: Required for BS CPE} \newcommand\courseExpectation{1. Explain information systems security and its effect on people and businesses. 2. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. 3. Explain the role of access controls in an IT infrastructure. 4. Explain the role of IT operations, administration, and security policies. 5. Explain the importance of security audits, testing, and monitoring in an IT infrastructure. 6. Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems. 7. Explain how businesses apply cryptography in maintaining information security. 8. Describe networking principles and security mechanisms. 9. Apply information security standards and U.S. compliance laws to real-world applications in both the private and public sector. 10. Describe information systems security educational opportunities and professional certifications } \newcommand\ABETOutOne{0} \newcommand\ABETOutTwo{0} \newcommand\ABETOutThree{0} \newcommand\ABETOutFour{0} \newcommand\ABETOutFive{0} \newcommand\ABETOutSix{0} \newcommand\ABETOutSeven{0} \newcommand\covTopics{\item • Malware and cyber threat characteristics including advanced persistent threats (APTs) \item • Computer network defense \item • Penetration testing/ethical hacking \item • Commercial software packages aimed at achieving increasing levels of Cyber Security covering the areas of Data Protection and Privacy, Security Information and Event Management (SIEM), Governance, Risk and Compliance (GRC) \item • Principles of building trusted computer systems and secure applications \item • Security in mobile systems and social media systems \item • Security in web applications and systems } \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{4} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{1} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|l|X} \toprule \large \textbf{Week or Date} & \large \textbf{Topics or whatever} & \large \textbf{Reading or whatever}\\ \midrule \midrule 1 & Introduction & Chapter 1\\ 2 & Stuff... & \\ ... & & \\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{Grading policy here \\ \\ Letter grade scale: A(94--100), A--(90--93), B+(87--89), B(83--86), B--(78--82), C+(74--77),\\ C(70--73), F(<70)} \newcommand\HWandLabPolicy{Virtual Lab: The Virtual Labs are from the InfoSec Lab Sequence Our course is Information Security Fundamentals. OVESIAOLVZ Information on acquiring a token to access these labs Create an account > https://lab.infoseclearning.com/user/register Open a Chrome browser and go to lab.infoseclearning.com https://lab.infoseclearning.com/labs https://www.youtube.com/watch?v=k7jGRU3FXPg&feature=emb_title } \newcommand\AttendancePolicy{\textcolor{red}{State here if attendance is mandatory or not for your class. Provide a description of what it means to be present (e.g. seated and ready to go, or just in the room; be explicit).}} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then ypu should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).)}}