MSCS: CYB 506 – Advanced Topics in Cybersecurity
Categories: MS in Computer Science
About Course
- This course delves into current and emerging topics in cybersecurity, providing students with an understanding of the latest challenges and innovations in the field.
- Focus areas include Internet of Things (IoT) security, cloud security, and advanced threat detection techniques.
- The course is designed to keep students at the forefront of cybersecurity, equipping them with the knowledge and skills to address evolving threats and secure modern computing environments.
Course Learning Outcomes:
- Demonstrate a deep understanding of IoT and cloud security challenges and solutions.
- Analyze and respond to advanced cybersecurity threats with effective countermeasures.
- Implement security strategies tailored to emerging technologies and modern computing architectures.
- Stay informed on the latest trends and technologies in cybersecurity to proactively address new threats.
Course Content
Week 1: Introduction to Advanced Cybersecurity Topics
-
Introduction to Advanced Cybersecurity Topics
04:00 -
LO1: Explain Emerging Trends in Cybersecurity with Emphasis on IoT and Cloud Security
15:32 -
LO2: Describe Scope and Significance of Advanced Cybersecurity Challenges in Modern Environments
00:00 -
LO3: Summarize Fundamental Concepts of IoT and Cloud Security based on Core Textbook
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 2: IoT Security Challenges
-
IoT Security Challenges
00:00 -
LO1: Define Common Vulnerabilities and Attack Vectors affecting IoT Devices
00:00 -
LO2: Analyze Security Risks associated with Large-Scale IoT Ecosystems
00:00 -
LO3: Evaluate IoT Security Challenges using Real-World Case Studies
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 3: IoT Security Solutions
-
IoT Security Solutions
00:00 -
LO1: Explain Encryption, Authentication, and Access Control Mechanisms for IoT Devices
00:00 -
LO2: Describe Secure Architecture Models for IoT Systems
00:00 -
LO3: Apply IoT Security Solutions to Implementation Scenarios
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 4: Cloud Security Fundamentals
-
Cloud Security Fundamentals
00:00 -
LO1: Explain Cloud Security Architecture and Shared Responsibility Model
00:00 -
LO2: Describe Data Protection Mechanisms in Cloud Environments
00:00 -
LO3: Analyze Cloud Security Risks across Service and Deployment Models
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 5: Advanced Cloud Security Techniques
-
Advanced Cloud Security Techniques
00:00 -
LO1: Explain Identity and Access Management Concepts in Cloud Environments
00:00 -
LO2: Describe Encryption and Secure Storage Techniques in Cloud Platforms
00:00 -
LO3: Evaluate Cloud Security Controls using Case Studies
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 6: Securing Hybrid and Multi-Cloud Environments
-
Securing Hybrid and Multi-Cloud Environments
00:00 -
LO1: Explain Security Strategies for Hybrid and Multi-Cloud Architectures
00:00 -
LO2: Describe Cross-Cloud Security Challenges and Risk Factors
00:00 -
LO3: Analyze Hybrid and Multi-Cloud Scenarios for Security Effectiveness
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 7: Advanced Persistent Threats (APTs)
-
Advanced Persistent Threats (APTs)
00:00 -
LO1: Define Advanced Persistent Threats and Core Characteristics
00:00 -
LO2: Explain Techniques used by Advanced Attackers to Evade Detection
00:00 -
LO3: Evaluate Mitigation Strategies for Defending against APTs
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 8: Midterm Test or Assignment
-
Mid Term
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Short Answer Questions
-
Scenario-Based Multiple Choice Questions
Week 9: Threat Intelligence and Advanced Threat Detection
-
Threat Intelligence and Advanced Threat Detection
00:00 -
LO1: Explain Role of Threat Intelligence in Cybersecurity Operations
00:00 -
LO2: Describe Advanced Threat Detection Techniques and Tools
00:00 -
LO3: Analyze Threat Intelligence Data to Support Proactive Defense Strategies
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 10: Security in Edge Computing
-
Security in Edge Computing
00:00 -
LO1: Explain Core Concepts of Edge Computing and Associated Security Challenges
00:00 -
LO2: Describe Security Solutions for Edge Computing Environments
00:00 -
LO3: Evaluate Edge Security Approaches using Case Studies
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 11: Blockchain and Cybersecurity
-
Blockchain and Cybersecurity
00:00 -
LO1: Describe Blockchain Technology and Cybersecurity Implications
00:00 -
LO2: Explain Role of Blockchain in Enhancing Data Integrity and Trust
00:00 -
LO3: Analyze Blockchain Use Cases for Cybersecurity Improvement
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 12: Machine Learning in Cybersecurity
-
Machine Learning in Cybersecurity
00:00 -
LO1: Explain Application of Machine Learning in Threat and Anomaly Detection
00:00 -
LO2: Describe Predictive Security Models based on Machine Learning Techniques
00:00 -
LO3: Evaluate Effectiveness of Machine Learning Techniques in Cybersecurity
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 13: Quantum Computing and Impact on Cybersecurity
-
Machine Learning in Cybersecurity
00:00 -
LO1: Explain Fundamental Concepts of Quantum Computing related to Cybersecurity
00:00 -
LO2: Describe Cryptographic Threats posed by Quantum Computing
00:00 -
LO3: Analyze Quantum-Resistant Cryptographic Strategies
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 14: Ethical and Legal Considerations in Advanced Cybersecurity
-
Ethical and Legal Considerations in Advanced Cybersecurity
00:00 -
LO1: Explain Legal Frameworks governing Advanced Cybersecurity Practices
00:00 -
LO2: Describe Ethical Challenges and Privacy Issues in Cybersecurity
00:00 -
LO3: Evaluate Cybersecurity Decisions using Ethical and Legal Principles
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 15: Review and Emerging Technologies
-
Review and Emerging Technologies
00:00 -
LO1: Summarize Key Concepts covered throughout the Course
00:00 -
LO2: Analyze Emerging Cybersecurity Technologies and Future Trends
00:00 -
LO3: Evaluate Preparedness to Address Evolving Cyber Threats
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 16: Final Test or Project
-
Final Test
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation