Course

Credit Type:
Course
ACE ID:
UNLV-0001
Version:
1
Organization:
Location:
Online
Length:
6 months (360 hours)
Minimum Passing Score:
80
ACE Credit Recommendation Period:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 4 IT Fundamentals
Lower-Division Baccalaureate 4 Emerging Topics in IT
Lower-Division Baccalaureate 4 Cybersecurity
Lower-Division Baccalaureate 4 Survey of Topics in Cybersecurity
Lower-Division Baccalaureate 3 Cybersecurity Practices
Lower-Division Baccalaureate 4 Survey of Cybersecurity Applications
Lower-Division Baccalaureate 1 Capstone
Students receiving credit for this program may not also receive credit for UNLV-0002: Explorer; UNLV-0003: Practitioner; or UNLV-0004 Professional.
Description

Objective:

The program objective is to provide comprehensive training across all cybersecurity modules, preparing participants to develop a deep understanding of the field. This option covers every module in our curriculum, offering the most thorough learning experience and equipping you with the skills needed to succeed in various cybersecurity roles.

Learning Outcomes:

  • IT Basics: Demonstrate foundational knowledge and practical skills in identifying, assembling, configuring, maintaining, and troubleshooting personal computer hardware and software; manage operating systems and file systems; understand networking principles and security measures; apply professional operational procedures, including safety and effective communication
  • Privacy-Legal Foundations and Ethics: Understand and apply legal, ethical, and privacy principles in healthcare information security, including stakeholder responsibilities, administrative and operational considerations, and the role of evidence in legal disputes
  • Security Principles and Foundations: Understand and apply fundamental cybersecurity concepts, including terminology, the security life cycle, the CIA triad (Confidentiality, Integrity, Availability), access control models (MAC, DAC, RBAC, Lattice), and the balance between security measures and system usability, to develop and implement effective organizational security policies and procedures
  • Coding: Acquire proficiency in coding by understanding syntax, utilizing variables, functions, operators, and control structures, and applying these skills to manipulate data and construct functional programs
  • Network Foundations: Grasp the fundamental principles of networking, including the OSI model, TCP/IP protocols, wireless networks, and essential networking applications, to design and manage efficient and secure network systems
  • Database Management: Develop an understanding of database concepts, design models, and the use of SQL for data definition and manipulation, to effectively manage and secure database systems
  • Artificial Intelligence: Explore the evolution of AI, various learning approaches, data and knowledge representation techniques, and the legal, ethical, and privacy considerations associated with AI applications in cybersecurity and healthcare
  • Cryptography: Understand the goals and principles of cryptography, including secret key primitives, message authentication codes, and key management techniques, to secure communications and data
  • Blockchain: Examine the security mechanisms behind blockchain technology, its applications in various sectors, including healthcare, and analyze use cases such as IBM Hyperledger Fabric
  • Information Security: Identify and implement fundamental design security principles, utilize the adversarial model to enhance security policies, and manage access controls, malware defenses, and system hardening to protect organizational assets
  • Network Security: Analyze network traffic, understand the structure of TCP/IP packets, implement firewalls and intrusion detection/prevention systems, and secure wireless communications to safeguard network infrastructures
  • Cloud Foundations: Explain the fundamental concepts of cloud computing, including its evolution, benefits, challenges, and the role of system virtualization, to design and manage cloud-based services and infrastructures
  • Cyber Threat Hunting: Adopt a proactive approach to cybersecurity by identifying and mitigating threats that have evaded existing security measures, utilizing tools like the MITRE ATT&CK Framework and analyzing logs and open-source intelligence
  • Digital Forensics: Conduct thorough investigations of data breaches and security incidents by analyzing operating systems, disk structures, and utilizing forensic tools to gather, preserve, and report evidence for legal proceedings
  • Data Mining: Apply data mining techniques to uncover hidden patterns and insights within large datasets, enhancing decision-making processes and strategic planning
  • Cognitive Computing: Explore the integration of computer science with neuroscience to develop systems that mimic human cognitive processes, enhancing adaptability and decision-making capabilities
  • Database Security: Assess and implement security measures for database systems, including access controls, encryption, and auditing, to protect sensitive information from unauthorized access and breaches
  • Cloud Security: Design and implement security measures for cloud services, assess risks and vulnerabilities, and ensure compliance with industry standards and regulatory requirements to protect cloud-based infrastructures
  • Risk Analysis: Evaluate and categorize risks related to technology, individuals, and the enterprise, applying methodologies to recommend appropriate responses and enhance organizational security posture
  • Internet of Things: Understand the fundamental concepts of IoT, including its technologies, sensors, and security challenges to design and manage secure IoT systems
  • Robotics Process Automation Analysis: Analyze the system architecture enabling robotics, identify common threats and cyber-attacks, and address ethical issues related to robotics in healthcare to ensure secure and trustworthy operations
  • Postquantum Cryptography: Explore quantum computing technologies, differentiate between classical and quantum computing, and implement quantum key distribution algorithms to address data security challenges in the quantum era
  • Capstone Project: Integrate knowledge and skills acquired throughout the program to analyze and solve real-world cybersecurity scenarios, demonstrating proficiency in applying concepts to practical situations

General Topics:

  • IT Basics
  • Privacy-Legal Foundations and Ethics
  • Security Principles and Foundations
  • Coding
  • Network Foundations
  • Database Management
  • Artificial Intelligence
  • Cryptography
  • Blockchain
  • Information Security
  • Network Security
  • Cloud Foundations
  • Cyber Threat Hunting
  • Forensics
  • Data Mining
  • Cognitive Computing
  • Database Security
  • Cloud Security
  • Risk Analysis
  • Internet of Things
  • Robotics Process Automation Analysis
  • Post Quantum Cryptography
  • Capstone Project
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Computer Based Training
  • Practical Exercises
  • Project-based Instruction
  • Course content materials are presented in an interactive text format, via Articulate Rise presentations.

Methods of Assessment:

  • Case Studies
  • Examinations
  • Quizzes
  • Written Papers
Supplemental Materials
Equivalencies

Other offerings from University of Louisville