The course delivers extensive educational content about proactive cybersecurity defense systems where students master firewall deployment and endpoint protection methodology and risk evaluation and complete full security policy development. The course focuses on practical application with industry-standard methods receiving top priority.
For each unit of credit, a minimum of three hours per week with one of the hours for class and two hours for studying/preparation outside of class is expected.
The CIS Program will provide superior learning opportunities in the area of information technology utilizing current technology to enable all students to archive their career and/or educational goals.
Outcome #1: Read with comprehension, be critical of what they read, and apply knowledge gained from their reading to broader issues of the day.
Outcome #5: Demonstrate the ability to think critically by gathering facts, generating insights, analyzing data, and evaluating information.
Outcome #6: Exhibit skills in information and technological literacy.
Outcome #9: Exhibit workplace skills to include respect for others, teamwork competence, attendance/punctuality, decision making, conflict resolution, truthfulness/honest, positive attitude, judgment, responsibility.
- Configure and manage firewall systems to protect network infrastructures.
- Implement endpoint protection strategies to safeguard devices against threats.
- Conduct comprehensive risk assessments to identify and mitigate potential vulnerabilities.
- Develop and enforce security policies aligned with organizational goals and compliance requirements.
- Stay informed about emerging threats and adapt defense strategies accordingly.
- Introduction to Security Posture
- Incident Response
- What is a Cyber Strategy
- Understanding Cyber-security Kill Chain
- Reconnaissance
- Compromising the system
- Chasing a user’s Identity
- Lateral Movement & Privilege Escalation
- Security Policy
- Network Segmentation
- Active sensors & Threat Intelligence
- Investigating An Incident
- Recovery Process
- Vulnerability Management
- Log Analysis
- Weekly questions: Students will do tests weekly to check their comprehension of important concepts of their learning materials
- Lab Tests: The security courses include practical lab sessions that focus on tool system configuration.
- Midterm Examination: The first part of the course receives thorough assessment through an extensive test that covers complete course subject matter.
- The Capstone Project: The final project entails applying the knowledge learned to a practical real-world project
1. Industry reports along with white papers about present threats.
2. Virtual practical training opportunities are available to students through designated online laboratories.
3. Regular interaction with professionals working in the industry.
Assessment in this course will be measured with a variety of tools including but not limited to:
- Weekly questions
- Lab Tests.
- Midterm Examination
- The Capstone Project
SCCC Policy
Technical support is available by contacting the SCCC IT Department at itech@sccc.edu
Canvas Help: canvashelp@sccc.edu
Under the Americans with Disabilities Act, Seward County Community College will make reasonable accommodations for students with documented disabilities. If you need support or assistance because of a disability, you may be eligible for academic accommodations. Students should identify themselves to the Mental Health Counselor at 620-417-1106 or go to the Student Success Center in the Hobble Academic building, room A149.