CNIT 160: Cybersecurity Responsibilities

Fall 2019 Sam Bowne

Schedule · Lectures · Projects · Links · Home Page

Catalog Description

Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.

Student Learning Outcomes

Upon completion of this course, a student will be able to:
  • Compare security technologies including encryption, storage, and transmission methods
  • Evaluate social and political arguments relating to information security and privacy
  • Engage in healthy and constructive debates that include both technical and political issues around security


"Cybersecurity Program Development for Business: The Essential Planning Guide" by Chris Moschovitis
Publisher: Wiley; 1 edition (April 6, 2018)
ASIN: B07C1CJHWG; ISBN-10: 111942951X
Buy from Amazon ($34 or so)

Schedule (not ready yet)


Grading Policy
1. Understanding Risk
2. About Tech
3. Cybersecurity Primer
4. Managment, Governance, and Alignment
5. Your Cybersecurity Program
5. Assets
7. Threats
8. Vulnerabilities
9. Environments
10. Controls
11. Incident Response Planning
12. People
13. New Developments

Projects (not ready yet)


Radix Economic Model (1-31-19)

Last Updated: 1-31-19