Course

Course Summary
Credit Type:
Course
ACE ID:
TEEX-0252
Organization's ID:
CYB301
Location:
Online
Length:
39 hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 4 Cybersecurity Risk Fundamentals
Students must complete Cyber Incident Analysis and Response AWR169 (TEEX-0284), Disaster Recovery for Information Systems WR176 (TEEX-0285), Information Risk Management AWR177 (TEEX-0286), Network Security for Homes and Small Businesses AWR396, and Detecting and Responding to a Cyber Attack AWR399 to receive credit.
Description

Objective:

The course objective is to provide requisite background theory and recommended best practices needed by business managers to keep their offices running during cyber incidents of different types.

Learning Outcomes:

  • Demonstrate an understanding of the fundamentals of cyber incident analysis and response.
  • Demonstrate comprehension of the basics of continuity and disaster recovery planning, tailored to meet the needs of business planners.
  • Demonstrate an understanding of the fundamentals of risk management in the IT and information management arena.
  • Demonstrate comprehension of the fundamentals of network securing and how to secure small local area networks (LANs).
  • Demonstrate comprehension of the fundamentals of detecting and responding to cyber attacks.

General Topics:

  • • Types of cyber incidents, common forms of malware and attacks, an outline of the cyber incident management process, and common standards for cyber incident management • Cyber incident management policies, services and procedures • Incident monitoring, log management, detection, cyber incident triage, event scope and characteristics, incident investigation, impact and escalation, and cyber incident management software and services • Mitigation of specific common types of cyber incidents • Cyber attack categories, outcome discussions, vulnerability analysis, evidence and digital forensics, and chain of custody • Impact analysis • Incident response teams, recovery plans and the procedures to use when changing and updating the business information continuity plan • Outsourcing • Software patching, methods to minimize human error, and hardware failures • Access control and the verification and validation procedures • Federal information security laws and repercussions from noncompliance • HIPAA, Sarbanes-Oxley, and other notable federal laws • Procedures for enumerating threats and testing plans • Information systems risk management programs • Valuation of critical assets • Risk and hazard frameworks to common cyber threats • Risk prioritization, tolerance, and response • Cyber security control practices • Basic concepts of business continuity planning
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Computer Based Training
  • Practical Exercises

Methods of Assessment:

  • Examinations
  • Quizzes

Minimum Passing Score:

70%
Supplemental Materials