讲解CRN: 13506、辅导Python、讲解Cybersecurity、辅导Python编程设计
- 首页 >> Python编程SYLLABUS
Course Information:
CRN: 13506
Term: Spring 2019
Format: Online, Asynchronous
Learning Management System: Blackboard
(bb.uvm.edu)
Description:
This course builds on the material covered in CS166 - Cybersecurity Principles, with an emphasis on cyber
defense. Topics include cyber defense policy, privacy and ethics; network threat defense, intrusion
detection and prevention systems, intro to penetration testing, operating system security principles,
system/network admin basics, as well as cloud, mobile and IoT security. The course concludes with an
overview of security planning, management and incident response. Prerequisites: CS166 - Cybersecurity
Principles [CS021 - Computer Programming I: Python, CS 008 - Intro to Website Development]
Special Note: In order to develop a working knowledge of cybersecurity best practices, it is important to
gain an understanding of the techniques used by attackers. Thus, this course presents material that could
be used to exploit systems and/or end-users. The assignments are solely designed to be preformed in
isolated test environments provided or referred to by the course instructor, and are not to be used on any
University computer, or otherwise, with any form of malicious intent. Upon enrollment, students will be
expected to sign a statement certifying their commitment to ethical computing practices.
CYBERSECURITY DEFENSE
Syllabus - CS167 | Spring 2019 Page 2 of 5
Learning Objectives:
Understand key concepts related to cyber defense policy, privacy, and ethics
Gain a solid foundation of network threat defense mechanisms / countermeasures
Understand the role of intrusion detection and prevention systems
Understand fundamental security design principles as applied to operating systems
Gain exposure to common techniques used in penetration testing
Understand the basic functions performed by system and network administrators
Understand security concepts in cloud computing models
Gain exposure to mobile device and Internet of Things (IoT) security
Be able to develop a comprehensive security strategy, including security planning, business
continuity planning, risk analysis and disaster/recovery planning
Course Materials:
Required Textbook: Security in Computing, 5/E, By: Charles P. Pfleeger,
Shari Lawrence Pfleeger, and Jonathan Margulies.
ISBN: 9780134085043
Reliable Computer and (optional) ability to install virtual machines/Kali
Linux, local web server (MAMP), Python 3.x, PHP 5.x, web access, text
editor, word processing software, PDF converter, screenshots
Web: Python 3.x Documentation, PHP 5.x Documentation
Online Virtual Lab Environment: Requires $88 access fee
Suggested Reading: Social Engineering: The Art of Human Hacking, By
Christopher Hadnagy. ISBN: 978-0470639535
Class Philosophy:
Everyone is taking this class with the same objective: to learn. This class is designed to have you learn in
an online environment with your peers. The expectation is that you are respectful to all, and that you
participate and contribute on a regular basis. Stay current with the readings, ask questions often, and help
fellow students when they have questions. Please remember: you will get out of this class what you put
into it. Let’s have a great semester!
# MODULE ASSIGNMENT DUE DATE
0 Getting Started Introduction to course, syllabus, introduce yourself 1/22/19
1 Fundamentals of Cyber
Defense Policy, Privacy,
Legal, and Ethics
Reading: Chapter 9 - Privacy, Chapter 11 - Legal Issues and Ethics
(policies including HIPAA/FERPA, Sarbanes-Oxley, COPPA, US
Patriot Act, privacy concepts, ethical issues in computer security)
1/29/19
2 Introduction to Network Threat
Defense
Reading: Chapter 6 - Networks (strategic defenses, cryptography
in network security, IPsec, firewalls, VPNs, DMZs, attack surface
and vectors, network monitoring and mapping, network traffic
analysis)
2/05/19
3 Overview of Intrusion
Detection and Prevention
Systems
Reading: Chapter 6.8 - Networks/Intrusion Detection and
Prevention Systems (IDS, IDS controlled networks, pattern
matching and heuristic systems)
2/12/19
#
Syllabus - CS167 | Spring 2019 Page 3 of 5
Modules:
The following represents the tentative course modules and is subject to change at the
discretion of the instructor. Please refer to the assignment due dates posted in Blackboard for
the most current schedule.
Labs
30%
Assignments
25%
Final Exam
25%
Quizzes
5%
Discussions
15%
Grading Policy:
The course grade is comprised of a variety of
assignments, labs, quizzes, a final exam, and discussions.
For the “discussions” grade, since this is an online course
your effort is represented by your activity in the
discussion forums. You are required to make a post for
each topic within each thread Your post needs to be a
minimum of 100 words and be related to the subject in
order to let me know that you are staying current with
the course material. Your post may be in response to
another students’ post, however, it needs to be
comprehensive, as simply “I agree” or
“good point” - type responses will not
satisfy the requirement. Respectful and
appropriate posts are the expectation, as
is citing your sources.
Any grade appeal must be made within
one week of the grade being posted.
4 Introduction to Penetration
Testing
Reading: Metasploit documentation 2/19/19
5 Introduction to Operating
System Security
Reading: Chapter 5: Operating Systems
(Fundamental Security Design Principles as applied to an OS,
including domain separation, process isolation, resource
encapsulation, least privilege, processes, threads, virtualization/
hypervisors, file systems, rootkit, patching OS/application security
updates)
2/26/19
6 System and Network
Administration Essentials
Reading: Chapter 6.8 - Network Management
(OS installation, user accounts/management, password policies,
backup/restoring data, security policy development, network
configuration and port security)
3/05/19
7 Security Concepts in Cloud
Computing
Reading: Chapter 8 - Cloud Computing
(cloud services and models, cloud security concepts, cloud
security tools and techniques, identify management, )
3/26/19
8 Mobile Device and IoT
Security Basics
Reading: Chapter 13.1 - The Internet of Things
(smart devices, medical devices, program security failures, mobile
phones and mobile malware, security in IoT)
4/02/19
9 Security Planning:
Management and Incidents,
Risk Analysis
Reading: Chapter 10 - Management and Incidents (security
planning, security life-cycle, business continuity planning,
incidents, disaster planning/recovery, risk analysis)
4/16/19
10 Emerging Topics in
Cybersecurity
Reading: Chapter 13 - Emerging Topics (economics, electronic
voting, cyber warfare)
4/23/19
11 Final Exam Cumulative Final Exam, administered through Proctor U (requires
exam fee)
4/30/19
# MODULE ASSIGNMENT DUE DATE
Syllabus - CS167 | Spring 2019 Page 4 of 5
Syllabus - CS167 | Spring 2019 Page 5 of 5
Course Policies:
Attendance: This course is asynchronous, meaning that we will not meet at a particular time each
week. Even though we will not meet face-to-face in a physical classroom, participation on all
discussion boards is required and paramount to your success.
Late Policy: Late assignments are not accepted without explicit permission from the instructor,
and permission can only be granted in the case of an emergency AND provided the request was
made prior to the assignment due date. Late work may be subject to a penalty in points at the
discretion of the instructor.
SAS: In keeping with University policy, any student with a documented disability interested in
utilizing accommodations should contact SAS, the office of Disability Services on campus. SAS
works with students and faculty in an interactive process to explore reasonable and appropriate
accommodations, which are communicated to faculty in an accommodation letter.?? All students
are strongly encouraged to meet with their faculty to discuss the accommodations they plan to use
in each course. Please click on this link, Accommodation Guidelines, to better understand the
process. A student's accommodation letter lists those accommodations that will not be
implemented until the student meets with their faculty to create a plan. Contact SAS: A170 Living/
Learning Center; (802) 656-7753; access@uvm.edu; or www.uvm.edu/access
Religious Holidays: Students have the right to practice the religion of their choice. Each semester
students should submit in writing to their instructors by the end of the second full week of classes
their documented religious holiday schedule for the semester. Faculty must permit students who
miss work for the purpose of religious observance to make up this work. See the Interfaith
Calendar. Additional University of Vermont policies may be found at: UVM Policies.
Academic Honesty Policy: The Computer Science Department rigorously enforces the Code of
Academic Integrity Policy as outlined in the Code of Rights and Responsibilities and University
Policies. At the first suspicion of violation of this policy, the case will be immediately forwarded to
the Coordinator of Academic Integrity. The typical sanction for a violation is a grade of an "XF" in
the course. A second violation typically results in dismissal from the University.
Your assignments may be electronically compared to everyone else's. If you assist someone in
cheating you are guilty as well (this year or next). You must type and format your assignments
yourself, starting an assignment or copying and pasting from someone else's assignment is a case
of academic dishonesty and will be treated as such. Each work submitted must be your own work,
no collaboration is allowed, except as explicitly defined in the assignment instructions.
Copying an Exam in any shape or form including but not limited to photocopying, picture taking,
writing down or verbally dictating questions and or answers is considered academic dishonesty
and will be treated as such. The only external programming code you are allowed to use are the
examples provided by the instructor. Any other external code (i.e. found from a Google search,
etc.) is considered academic dishonesty and will be treated as such. If you feel the need to use free
code or shareware code, please consult with your instructor PRIOR to using it.