0% found this document useful (0 votes)
376 views2 pages

Cybersecurity Essentials Course Syllabus

This syllabus outlines a cybersecurity essentials course that provides 3 semester hours. The course teaches cybersecurity principles for securing networks and evaluates strategies, technologies, and concepts. Students will learn to design protected infrastructures, apply advanced filtering methodologies, assess and harden endpoints, examine mobile/cloud technologies, and analyze malware. Grades are based on written/practical exams, lab assignments, homework, and participation, with exams accounting for 50% and assignments/homework making up the remaining 50% of the final grade.

Uploaded by

Riska Amalia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
376 views2 pages

Cybersecurity Essentials Course Syllabus

This syllabus outlines a cybersecurity essentials course that provides 3 semester hours. The course teaches cybersecurity principles for securing networks and evaluates strategies, technologies, and concepts. Students will learn to design protected infrastructures, apply advanced filtering methodologies, assess and harden endpoints, examine mobile/cloud technologies, and analyze malware. Grades are based on written/practical exams, lab assignments, homework, and participation, with exams accounting for 50% and assignments/homework making up the remaining 50% of the final grade.

Uploaded by

Riska Amalia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Palo Alto Networks Cybersecurity Academy - Essentials Syllabus

Instructors Information Class Session Information


Name: Meeting Dates:
Office: Meeting Times:
Office Hours: Room Number:
Phone: Zoom:
E-Mail: Chat:

Course Information

I. Course Credits: 3 Semester Hours

II. Course Prerequisites: Cybersecurity Gateway

III. Recommended Textbook: PaloAlto Networks CyberSecurity Guide v3.

IV. Course Description:

This course evaluates cybersecurity principles and demonstrates how to secure a network
computing environment through the application of security controls.
Students will learn the nature and scope of today’s cybersecurity challenges, strategies for
network defense, as well as detailed information about next-generation cybersecurity
solutions.
Students will also deploy a variety of security methodologies as well as technologies and
concepts used for implementing a secure network environment.

V. Learning Objectives:

Upon completion of this course, students will be able to:

• Formulate an industry-standard design to protect infrastructure against cybersecurity


threats
• Apply advanced filtering methodologies such as user, application, and content ID to
protect against all known and unknown attack vectors
• Describe the basics of cryptography including synchronous/asynchronous encryption, PKI,
and certificates.
• Demonstrate ability to assess and harden endpoints based on security policies
• Describe uses of advanced malware research and analysis to provide enhanced protection
for enterprise networks
• Examine mobile and cloud-based connection technologies

VI. Course Grading:


Final grades are determined by a weighted average of all work assigned in the course and is
based on a combination of exams, papers/projects, writing assessments, and oral
presentations. Your final grade in this course is based on the following:

Examinations:

Written and Practical Exams Total: 50%

Course Assignments:

Lab Assignments Total: 25%


Homework Total: 20%

Participation: Total: 5%

Course Total: 100%

Letter grades are determined as follows:


A 90–100% of the total percentage points possible
B 80–89% of the total percentage points possible
C 70–79% of the total percentage points possible
D 65–69% of the total percentage points possible
F less than 65% of the total percentage points possible

Common questions

Powered by AI

The examination component constitutes 50% of the total course grade, serving as the primary means of assessing students' theoretical understanding and practical application of cybersecurity principles. Its significant weight is justified by the need to comprehensively evaluate both students' knowledge of cybersecurity concepts and their ability to apply this knowledge in addressing real-world problems .

Participation is weighted at 5% in the grading system to ensure that students focus primarily on mastering the core material and practical applications, which have higher stakes in understanding cybersecurity principles. While this encourages active involvement, the low weight might result in less emphasis on class discussions, affecting potential engagement and collaborative learning opportunities .

The course integrates mobile and cloud-based connection technologies by examining them as part of the curriculum, acknowledging their growing prevalence and impact on network security. This integration is significant as it reflects current industry trends where mobile and cloud technology are increasingly used, thus preparing students to address security challenges associated with these technologies as part of a comprehensive cybersecurity strategy .

The course structure ensures a comprehensive evaluation of students' understanding by employing a weighted grading system that includes written and practical exams (50%), lab assignments (25%), homework (20%), and participation (5%). This multifaceted approach assesses theoretical knowledge, practical skills, and engagement, thereby providing a holistic evaluation of the students' grasp of cybersecurity principles .

Project-based assignments play a crucial role in developing practical cybersecurity skills, allowing students to apply theoretical knowledge to real-world scenarios. These assignments encourage critical thinking, problem-solving, and hands-on experience, which are essential for effectively implementing cybersecurity measures and strategies in professional situations .

The course handles the teaching of cryptographic concepts by describing the basics of synchronous/asynchronous encryption, PKI, and certificates. This is significant because mastering these cryptographic concepts is essential for students to understand how data can be securely exchanged over networks and to ensure the authenticity and confidentiality of information, which are critical components of cybersecurity .

Requiring the Cybersecurity Gateway as a prerequisite contributes to the course's effectiveness by ensuring that students have foundational knowledge of cybersecurity before tackling more advanced topics. This prerequisite helps maintain a certain academic standard and ensures that all participants are adequately prepared, thereby enhancing the overall learning experience and outcomes .

Advanced filtering methodologies, such as user, application, and content ID, are vital in protecting networks as they enhance the ability to scrutinize data traffic at different levels and prevent both known and unknown attack vectors. This is important as it allows for more precise and effective threat detection and prevention, thereby strengthening the overall security posture of network environments .

The course's emphasis on deploying a variety of security methodologies enhances a student's ability to implement secure network environments by providing a broad range of tools and techniques for identifying and mitigating threats. This diverse approach ensures that students are capable of tailoring security measures to specific network architectures and threat landscapes, thereby creating robust and adaptable security frameworks .

The core learning outcomes of the Palo Alto Networks Cybersecurity Academy course include formulating an industry-standard design to protect infrastructure against cybersecurity threats, applying advanced filtering methodologies, describing the basics of cryptography, assessing and hardening endpoints, using advanced malware research, and examining mobile and cloud-based connection technologies. These outcomes contribute to understanding cybersecurity challenges by equipping students with comprehensive knowledge and skills to identify, analyze, and mitigate various cybersecurity threats across different areas and technologies .

You might also like