CNIT 160: Cybersecurity Responsibilities

Fall 2019 Sam Bowne

Schedule · Lectures · Projects · Links · Home Page


Catalog Description

Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.

Student Learning Outcomes

Upon completion of this course, a student will be able to:
  • Compare security technologies including encryption, storage, and transmission methods
  • Evaluate social and political arguments relating to information security and privacy
  • Engage in healthy and constructive debates that include both technical and political issues around security


"CISM Certified Information Security Manager All-in-One Exam Guide 1st Edition" by Peter H. Gregory
Publisher: McGraw-Hill Education; 1 edition (March 19, 2018)
ISBN: 1260027031
Buy from Amazon ($35)

Schedule (not ready yet)


Grading Policy

1 Becoming a CISM

2 Information Security Governance

Introduction to Information Security Governance
Security Strategy Development

3 Information Risk Management

Risk Management Concepts
Implementing a Risk Management Program
The Risk Management Life Cycle
Operaational Risk Management

4 Information Security Program Development and Management

Information Security Programs
Security Program Management
Security Program Operations
IT Service Management
Metrics and Monitoring
Continuous Improvement

5 Information Security Incident Management

Security Incident Response Overview
Incident Response Plan Development
Responding to Security Incidents
Business Continuity and Disaster Recovery Planning

Projects (not ready yet)


Radix Economic Model (1-31-19)
60% of small companies that suffer a cyber attack are out of business within six months.

Last Updated: 4-4-19