Skip to main content
CIT410Sciences2 Unitsintermediate

Cyber Secuity I

This course provides an overview of cyber security, designed to equip students with a comprehensive understanding of its fundamental principles and the cyberspace environment. It explores cyber security from both organizational and user perspectives, covering topics such as cyber threats, prevention techniques, computer forensics, and legal and ethical considerations. The course aims to provide the knowledge and skills necessary to navigate and secure the digital landscape effectively.

Transform this course into personalized study materials with AI

150h
Study Time
13
Weeks
12h
Per Week
none
Math Level
Course Keywords
Cyber SecurityCybercrimeForensicsCyber LawEthics

Course Overview

Everything you need to know about this course

Course Difficulty

Intermediate Level
Builds on foundational knowledge
65%
intermediate
📚
Math Level
No Math
🔬
Learning Type
Hands-on Practice

Course Topics

Key areas covered in this course

1

Cyber Security Fundamentals

2

Cybercrime Classification

3

Cyber Threat Management

4

Computer Forensics

5

Cyber Law

6

Cyber Ethics

Total Topics6 topics

Ready to Start

No specific requirements needed

This course is designed to be accessible to all students. You can start immediately without any prior knowledge or specific preparation.

Assessment Methods

How your progress will be evaluated (3 methods)

Assignments

Comprehensive evaluation of course material understanding

Written Assessment

Tutor-Marked Assessments

Comprehensive evaluation of course material understanding

Written Assessment

Final Examination

Comprehensive evaluation of course material understanding

Written Assessment

Career Opportunities

Explore the career paths this course opens up for you

Security Analyst

Apply your skills in this growing field

Network Administrator

Apply your skills in this growing field

IT Manager

Apply your skills in this growing field

Forensic Investigator

Apply your skills in this growing field

Cyber Law Consultant

Apply your skills in this growing field

Industry Applications

Real-world sectors where you can apply your knowledge

FinanceHealthcareGovernmentTelecommunicationsE-commerce

Study Schedule Beta

A structured 13-week journey through the course content

Week
1

Module 1: Cyber Security Fundamentals

7h

Unit 1: Cyber Security Fundamentals, Benefits, Cyber space and Cyber-Law

4 study hours
  • Read the unit introduction and learning outcomes.
  • Study the definitions of cyber security, cyberspace, and cyber law.
  • Examine the benefits of cyber security and the different security domains.
  • Complete the self-assessment exercise.

Unit 2: Cyber Crimes Classification and Types of Cyber Crimes

3 study hours
  • Study the classifications of cyber crimes and the types of cyber crimes.
  • Understand the differences between insider and external attacks.
  • Analyze the characteristics of structured and unstructured attacks.
  • Complete the self-assessment exercise.
Week
2

Module 1: Cyber Security Fundamentals

5h

Unit 3: Scope of Cybercrimes

5 study hours
  • Explore the nature and scope of cyber crime.
  • Examine the categories of cybercrimes against persons, property, and government.
  • Understand the motivations of cyber criminals.
  • Complete the self-assessment exercise.
Week
3

Module 2: Cyber Threat Management

5h

Unit 1: Firewalls

5 study hours
  • Understand the concept of firewalls and their characteristics.
  • Examine the limitations of firewalls.
  • Study the different types of firewalls: packet filtering, stateful inspection, application-level gateway, and circuit-level gateway.
  • Complete the self-assessment exercise.
Week
4

Module 2: Cyber Threat Management

5h

Unit 2: Virtual Private Networks (VPN)

5 study hours
  • Learn about Virtual Private Networks (VPNs) and their uses.
  • Understand the advantages and disadvantages of VPNs.
  • Study the different types of VPNs: remote access, intranet, and extranet.
  • Examine VPN technologies and protocols.
  • Complete the self-assessment exercise.
Week
5

Module 2: Cyber Threat Management

5h

Unit 3: Security Control Management

5 study hours
  • Understand the concept of access control and its importance.
  • Study the different types of access control: physical and logical.
  • Examine access control lists, groups, and roles.
  • Learn about the AAA framework: authentication, authorization, and accounting.
  • Complete the self-assessment exercise.
Week
6

Module 2: Cyber Threat Management

5h

Unit 4: Hardware and Software Prevention

5 study hours
  • Understand hardware protection mechanisms: CPU, memory, and I/O protection.
  • Study software and OS security: authentication, one-time passwords, program threats, and system threats.
  • Complete the self-assessment exercise.
Week
7

Module 3: Computer Forensics and Digital Investigation

5h

Unit 1: Computer Forensics

5 study hours
  • Understand the concept of computer forensics and its history.
  • Appreciate the characteristics of digital forensics and the digital forensics procedure.
  • Compare the advantages and disadvantages of computer forensics.
  • Complete the self-assessment exercise.
Week
8

Module 3: Computer Forensics and Digital Investigation

5h

Unit 2: Network, Disk, Malware and Database Forensics

5 study hours
  • Explain the concept of Disk Forensics and the process involved.
  • Understand Network Forensics procedure and methods.
  • Appreciate Network Forensics examinations.
  • Explain Malware Forensics.
  • Complete the self-assessment exercise.
Week
9

Module 3: Computer Forensics and Digital Investigation

5h

Unit 3: Email, Memory and Mobile Forensics

5 study hours
  • Understand the concept of Email Forensics and Memory Forensics.
  • Understand the concept of Mobile Phone Forensics.
  • Explain the digital Forensic Examination Process.
  • Complete the self-assessment exercise.
Week
10

Module 3: Computer Forensics and Digital Investigation

5h

Unit 4: Malware & Malware Analysis

5 study hours
  • Understand the term Malware Analysis.
  • Familiarize yourself with the types of malwares and malware analysis techniques.
  • Complete the self-assessment exercise.
Week
11

Module 4: Introduction to Cyber Law and Ethics

5h

Unit 1: Concept of Cyber Law

5 study hours
  • Justify cyber crimes as sanctioned in cyber laws.
  • Demonstrate an understanding of the concept of cyber law.
  • Complete the self-assessment exercise.
Week
12

Module 4: Introduction to Cyber Law and Ethics

5h

Unit 2: The INDIA cyber-Acts

5 study hours
  • Understand laws binding cyberspace.
  • Know your rights in data and privacy protection.
  • Learn from existing scenarios of cybercrimes in Nigeria.
  • Complete the self-assessment exercise.
Week
13

Module 4: Introduction to Cyber Law and Ethics

10h

Unit 3: The International Laws

5 study hours
  • Have a better understanding of international laws and treaties.
  • Explain international cyber-attacks previously occurred.
  • Complete the self-assessment exercise.

Unit 4: Cyber Ethics

5 study hours
  • Understand the use of ethical theories in ethical arguments.
  • Articulate the ethical tradeoffs in a technical decision.
  • Appreciate the role of professional codes of ethics.
  • Complete the self-assessment exercise.

This study schedule is in beta and may not be accurate. Please use it as a guide and consult the course outline for the most accurate information.

Course PDF Material

Read the complete course material as provided by NOUN.

Access PDF Material

Study Tips & Exam Preparation

Expert tips to help you succeed in this course

1

Review all unit summaries and key terms.

2

Practice with self-assessment exercises and TMAs.

3

Focus on understanding the different types of cybercrimes and their prevention.

4

Create concept maps linking forensic techniques to specific cyber incidents.

5

Study case studies to understand real-world applications of cyber law and ethics.

Related Courses

Other courses in Sciences that complement your learning