Iforce cte stem cyber security track



Download 48.43 Kb.
Date29.01.2017
Size48.43 Kb.
#11559

iforce CTE STEM cyber security track

A High School description of the courses in iForCE’s CTE STEM Cyber Security Track.




2015-2016 iForCE CTE STEM Cyber Security Track


Courses to be offered in the iForCE

(Institute for Cybersecurity Education)

CTE STEM Cyber Security Track

2015- 2016 School Year



Table of Contents





Executive Summary 5

Computer Systems Technology (Freshman Year) 6

Fall & Spring Semesters – Computer Systems Technology 2 “CompTIA A+” (1 Credit) 6

Student Learning Outcomes: 6

Suggested Student Certification Outcomes 6

Computer Network Software Operations (Sophomore Year) 7

Fall Semester – Computer Network Software Operations “CompTIA Network+” 7

Student Learning Outcomes: 7

Suggested Student Certification Outcomes 7

Spring Semester –Computer Network Software Operations cont. – “CompTIA Security+” 8

Student Learning Outcomes: 8

Certification Outcomes 8

Programming (Junior Year) 9

9

Fall Semester – Programming C++ 9



Student Learning Outcomes: 9

Certification Outcomes 9

Spring Semester –Programming Java 10

Student Learning Outcomes 10

Certification Outcomes 10

Advanced Computer Network Software Operations (Junior Year) 11

11

Fall Semester – Advanced Computer Network Software Operations “Windows” 11



Student Learning Outcomes 11

Certification Outcomes 11

Spring – Advanced Computer Network Software Operations “Linux” 12

Student Learning Outcomes 12

Certification Outcomes 12

Senior Project/Internship & Advanced Programming (Senior Year) 13

Fall/Spring – Senior Project and Internship 13

Certification Outcomes 13

Advanced Programming (Senior Year) 14

Fall – Advanced Programming - Python 14

Student Learning Outcomes 14

Certification Outcomes 14

Spring – Advanced Programming – EC-Council Certified Ethical Hacker 15

Student Learning Outcomes 15

Certification Outcomes 15

Additional recommended courses of studies 16

16

Introduction to Logic 16



Design and Analysis of Algorithms 16

Statistics 16




Executive Summary



In 2009 I started developing the CTE STEM Cyber Security Track. I researched what fundamental skills industry was looking for in entry level candidates. What certificates did industry accept as validation for those skills? What courses best developed the fundamental skills industry was looking for and prepared students for certifications that industry accepted. What sequence of those courses logically developed those skills, built a strong foundation, and prepared students for certifications. What course materials best facilitated instruction and learning in those courses. Lastly, what instructional methods were best for those courses? The end result is the CTE STEM Cyber Security Track.

Computer Systems Technology (Freshman Year)

Fall & Spring Semesters – Computer Systems Technology 2 “CompTIA A+” (1 Credit)


This course is an overview of computer architecture, which stresses the underlying design principles and the impact of these principles on computer performance. General topics include design methodology, processor design, control design, memory organization, system organization, and parallel processing. We will be using iForCE’s online learning environment in conjunction with other instructional resources for the instructional material including readings, lab exercises, quizzes and exams. It is suggested students be required to pass the CompTIA A+ and TestOut’s PC Pro certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program.

Student Learning Outcomes:


In this course, you will install, upgrade, repair, configure, optimize, troubleshoot, and perform preventative maintenance on basic personal computer hardware and operating systems.

You will be able to:



  • Identify the hardware components of a computer.

  • Identify the basic components and functions of an operating system.

  • Identify the operational procedures that should be followed by PC technicians.

  • Identify and configure peripheral components.

  • Manage system components.

  • Identify and configure operating systems.

  • Identify the hardware and software requirements for custom client environments.

  • Identify network technologies.

  • Identify, configure, and maintain SOHO networks.

  • Support laptops.

  • Configure mobile computing devices.

  • Support printers.

  • Implement concepts and techniques used to secure computing devices and environments.

  • Troubleshoot hardware components.

  • Troubleshoot system-wide issues.

Suggested Student Certification Outcomes


CompTIA A+ Certification

Testout PC Pro Certification


Computer Network Software Operations (Sophomore Year)

Fall Semester – Computer Network Software Operations “CompTIA Network+”


This course is an introductory look at computer communication from an engineering perspective. It will focus on the principles of computer communication and the basic concepts in the architecture of computer networks. As an introductory course, it covers a broad set of concepts and implementations, addressing both theory and practice, using the layered model of computer communications. Labs are used to reinforce concepts and develop practical networking skills. We will be using iForCE’s online learning environment in conjunction with other instructional resources for the instructional material including readings, lab exercises, quizzes and exams. It is suggested students be required to pass the CompTIA Network+ and TestOut’s Network Pro certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program.

Student Learning Outcomes:


In this course, you will describe the major networking technologies, systems, skills, and tools in use in modern networks.

You will be able to:



  • Configuring network hardware, topologies, and cabling

  • Connecting multiple Ethernet components

  • Installing and configuring routers and switches

  • Working with TCP/IP applications and network protocols

  • Configuring IPv6 routing protocols

  • Setting up clients and servers for remote access

  • Configuring wireless networks

  • Securing networks with firewalls, NAT, port filtering, packet filtering, and other methods

  • Implementing virtualization

  • Building a SOHO network

  • Managing and troubleshooting networks

  • Building a network with the OSI and TCP/IP models



Suggested Student Certification Outcomes


CompTIA Network+ Certification

Testout Network Pro Certification




Spring Semester –Computer Network Software Operations cont. – “CompTIA Security+”


This course proposes to introduce the student to the identification of vulnerabilities, forms of attack, appropriate countermeasures, and the detection and defense of the same. Tools and techniques for the securing of hardware, software and data, including physical security are covered. The issues and facilities available to both the intruder and administrator will be examined and evaluated with appropriate exercises to illustrate their effect. We will be using iForCE’s online learning environment in conjunction with other instructional resources for the instructional material including readings, lab exercises, quizzes and exams. It is suggested students be required to pass the CompTIA Security+ and TestOut’s Security Pro certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program.

Student Learning Outcomes:


In this course, you will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.
You will be able to:


  • Identify the fundamental concepts of computer security.

  • Identify security threats and vulnerabilities.

  • Examine network security.

  • Manage application, data, and host security.

  • Identify access control and account management security measures.

  • Manage certificates.

  • Identify compliance and operational security measures.

  • Manage risk.

  • Manage security incidents.

  • Develop a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP).

Certification Outcomes


CompTIA Security+ Certification

ISC2 SCCP



Testout Security Pro Certification

Programming (Junior Year)

Fall Semester – Programming C++


Using the C++ programming language, this course introduces algorithmic problem solving, basic control and data structures, and procedural abstraction. Topics include language syntax and semantics, arithmetic expressions, operators, functional decomposition, functional calls and parameters, file input and output, identifier scope and lifetime, switch and loop structures, array processing, strings, searching and sorting. The class will use An Introduction to Programming with C++ textbook, and be instructor led, with labs.

Student Learning Outcomes:


In this course you will begin programming with a solid foundation in theory and practice. The course assumes no programming experience. It introduces programming concepts such as data types, structure, decision making, looping, functions, arrays, files, and objects. Good programming style and logical thinking are emphasized throughout.
You will be able to:


  • Program at a beginner level

  • Explain the Problem-Solving Process

  • Distinguish among a Variable and Constant

  • Complete the Problem-Solving Process

  • Include the Selection Structure in Pseudocode and a Flowchart

  • Include Nested and Multiple-Alternative Selection in Pseudocode and a Flowchart

  • Differentiate between a Pretest loop and a Posttest loop

  • Include a Posttest loop in Pseudocode and a Flowchart

  • Create and Invoke Value-Returning Functions

  • Create Program-Defined Void Functions

  • Declare and Use One-dimensional Arrays

  • Declare and Initialize Two-dimensional Array

  • Utilize Strings

  • Open Read Write and Close Sequential Access Files



Certification Outcomes


There are no certifications related to this course, rather students will have a portfolio of projects completed.


Spring Semester –Programming Java


The Object-Oriented Programming course is a study of concepts, terminology, and methodologies used in object-oriented systems, languages, and applications. Students will design and implement software systems using object-oriented analysis and design techniques. The purpose of this course is to develop a thorough understanding of object-oriented (OO) design, systems, and applications. The lecture portion of the course will emphasize both OO design concepts and language specific applications. Programming assignments will provide students with experience in an object-oriented programming language, namely Java. Also, comparisons will be made to OO design concepts in C++. The textbook used for this course will be Java 7 for the Absolute Beginner.

Student Learning Outcomes


This course assumes you are familiar an operating system and creating files. It helps if you are familiar with command files or batch files. In this course you will learn how to install a development environment. Then you will learn the basics of how Java works, including operators, data types, branching and looping, and how object-oriented languages define and solve problems. Next you will work with files, their contents, and create a user interface for a program. Lastly, you will create animations and video games.

You will be able to:




  • Write your first Java Program

  • Use Java Syntax

  • Use Data Types

  • Use Operators

  • Compare Objects

  • Control the flow of Logic

  • Develop Objects

  • Specify Relationships between Objects

  • Write a User Interface

  • Write and Read Files

  • Write and Read XML

  • Create Animation

  • Debug with Eclipse

  • Make a Computer Game

  • Use Garbage Collection

  • Use Recursion

  • Use Generis and Regular Expressions



Certification Outcomes


There are no certifications related to this course, rather students will have a portfolio of Java projects completed.

Advanced Computer Network Software Operations (Junior Year)

Fall Semester – Advanced Computer Network Software Operations “Windows”


System Administration I topics focus on Microsoft Windows Server 2012. Topics will include security issues, user and group administration, active directory services, DHCP, DNS, SSH, backup and restoration strategies and techniques, integrated mass storage technologies and alternative client technologies. We will be using iForCE’s online learning environment in conjunction with other instructional resources for the instructional material including readings, lab exercises, quizzes and exams.

Student Learning Outcomes


This course is designed to provide students with essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, such as installing a standalone system, file systems authentication, and user support services are explored.

You will be able to:




  • Install Upgrade and Migrate to Windows 7 and 8

  • Deploy Windows 7

  • Configure Hardware and Applications

  • Configure Network Connectivity

  • Configure Access to Resources

  • Configure Mobile Computing

  • Monitor and Maintain Systems running Windows 7 and 8

  • Configure Backup and Recovery Options

  • Install and configure servers

  • Configure server roles and features

  • Configure Hyper-V

  • Deploy and configure core network services

  • Install and administer Active Directory

  • Create and manage Group Policy



Certification Outcomes


Microsoft 70-680 & 687

TestOut’s Windows Client Pro

Microsoft (MS 70-410) Windows Server Pro: Install & Configure


Spring – Advanced Computer Network Software Operations “Linux”


System Administration II topics focused on the Linux operating system. We will be using iForCE’s online learning environment in conjunction with other instructional resources for the instructional material including readings, lab exercises, quizzes and exams.

Student Learning Outcomes


This course is designed to provide students with essential knowledge and skills to implement, administer, and troubleshoot Linux servers in a networked environment.
You will be able to:


  • Determine and Configure Hardware Settings

  • Boot the System

  • Change Runlevels and Shutdown or Reboot System

  • Design Hard Disk Layout

  • Install a Boot Manager

  • Manage Shared Libraries

  • Use Debian Package Management

  • Use RPM and YUM Package Management

  • Use GNU and Unix Commands

  • Process Text Streams Using Filters

  • Perform Basic File Management

  • Use Streams Pipes and Redirects

  • Create Monitor and Kill Processes

  • Modify Process Execution Priorities

  • Search Text Files Using Regular Expressions

  • Perform Basic File Editing Operations using Vi

  • Create Partitions and Filesystems

  • Maintain the Integrity of Filesystems

  • Control Mounting and Unmounting of Filesystems

  • Manage Disk Quotas

  • Manage File Permissions and Ownership

  • Create and Change Hard and Symbolic Links

  • Find System Files and Place Files in the Correct Location



Certification Outcomes

CompTIA Linux+


Senior Project/Internship & Advanced Programming (Senior Year)

Fall/Spring – Senior Project and Internship

The students will intern and journal their productivity, meeting as a class on a weekly basis to discuss their experiences.

If no internship program is available students will work on a senior project

Certification Outcomes

There are no certifications related to this course.

Alternatives to Certifications:

Internship or Senior Project



Advanced Programming (Senior Year)

Fall – Advanced Programming - Python


The Survey of Programming Languages course is a collection of selected programming languages for students familiar with programming. Students will write programs in a broad variety of languages, with an emphasis on Python. Students at the conclusion of this course will be familiar with Ruby, Perl, XHTML and Python. We will be using iForCE’s online learning environment in conjunction with other instructional resources for the instructional material including readings, lab exercises, quizzes and exams. Textbooks used for this course will include Ruby Programming for the absolute beginner, Perl Programming for the absolute beginner, Python Programming for the absolute beginner and HTML, XHTML, & CSS for the Absolute Beginner.

Student Learning Outcomes


This course is designed for the beginner programmer to learn more advanced programming techniques used by Cyber Security professionals through Python. Students will acquire the skills needed for practical Python programming applications and how these skills can be put to use in real-world scenarios.

You will be able to:




  • Program in Python

  • Use basic programming principles

  • Use basic data structures

  • Solve a programming problem using the processes and skills required implement a solution using Python



Certification Outcomes

There are no certifications related to this course, however students will have a portfolio of programs developed.



Spring – Advanced Programming – EC-Council Certified Ethical Hacker

Using the Python programming language this class will immerse the students into a hands-on environment where they will be shown how to conduct penetration testing. They will be exposed to an entirely different way of achieving optimal information security posture in their organization. They will scan, test, penetrate and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others. EC-Council textbook on CEHv8 will be used in this course.



Student Learning Outcomes


This course is designed to prepare students for careers as security officers, auditors, security professionals, site administrators, and to be concerned about the integrity of the network infrastructure.

You will be able to:




  • Apply countermeasures to secure your system against threats

  • Test access to your data using ethical hacking techniques

  • Implement real-world hacking techniques to test system security

  • Employ complex tools to identify and analyze your company’s risks and weaknesses

  • Find vulnerabilities in a network infrastructure

  • Scan system resources with advanced IP scanners

  • Hide messages with image steganography

  • Hack a web server by manipulating input

  • Test for XSS in a web application

  • Detect intrusions using Snort

  • Encrypt data to prevent unauthorized access.

Certification Outcomes

EC –Council C|EH v8 Certification


Additional recommended courses of studies

Introduction to Logic

Study of correct reasoning, including the recognition, analysis, and criticism of arguments; relevant topics include informal fallacies, syllogistic reasoning, and systems of deduction. Each one of us wants to think clearly and correctly.  Logic helps us to do this by studying the forms that valid reasoning takes.  This course will treat both informal and formal logic.  We will cover common rhetorical fallacies, classical syllogistic logic, and propositional logic.  The course aims to provide students with the tools needed to improve their critical thinking and inference skills.



Design and Analysis of Algorithms

In this course you will learn several fundamental principles of algorithm design: divide-and-conquer methods, graph algorithms, practical data structures (heaps, hash tables, search trees), randomized algorithms, and more.



Statistics



Statistics has become known as the mathematical tool or approach for analyzing data in order to draw reliable conclusions. This course will consider the most useful statistical methods; identify the statistical methods most widely used in education, psychology, and the social sciences; and study the mathematical formulas that are used in statistical applications. Prerequisite: MTH 113 or MTH 123. The textbook recommended for this course will be Statistics for the Utterly Confused.

Download 48.43 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2022
send message

    Main page