CYBR101 — Cybersecurity Fundamentals

5 credits Catalog-Derived

Introduces cybersecurity through sociology and psychology lenses, covering phishing, spoofing, privacy, social engineering, and ethics while developing critical thinking and information literacy skills.

5
Objectives
40
Matches
40
Reviewed
12
Occupations
Your experience with this course
Jessica Doner (taken)
Top occupation matches for this course
60.2% Penetration Testers 22t
69.6% Information Security Engineers 20t
62.6% Digital Forensics Analysts 12t
67.0% Information Security Analysts 9t
56.5% Blockchain Engineers 8t

Learning Objectives & Matches

LO1

Identify and analyze social engineering attacks including phishing, pretexting, and baiting

10 O*NET task matches
Batch:
Penetration Testers
51% ok

Identify new threat tactics, techniques, or procedures used by cyber threat actors.

Claude Opus 4.6 denied
Information Security Engineers 4.2/5
49% ok

Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.

Claude Opus 4.6 denied
Penetration Testers
48% ok

Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.

Claude Opus 4.6 denied
Blockchain Engineers
48% ok

Assess blockchain threats, such as untested code and unprotected keys.

Claude Opus 4.6 denied
Information Security Engineers 4.6/5
47% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 denied
Penetration Testers
47% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 denied
Penetration Testers
45% ok

Develop and execute tests that simulate the techniques of known cyber threat actors.

Claude Opus 4.6 denied
Information Security Engineers 3.8/5
45% ok

Coordinate vulnerability assessments or analysis of information security systems.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
44% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 denied
Penetration Testers
43% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
LO2

Evaluate privacy and security threats to individuals and organizations

10 O*NET task matches
Batch:
Blockchain Engineers
56% ok

Assess blockchain threats, such as untested code and unprotected keys.

Claude Opus 4.6 denied
Web Administrators 4.2/5
55% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Web Administrators 4.5/5
55% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
Penetration Testers
54% ok

Identify new threat tactics, techniques, or procedures used by cyber threat actors.

Claude Opus 4.6 approved at 100
Penetration Testers
53% ok

Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.

Claude Opus 4.6 approved at 100
Information Security Engineers 3.8/5
53% ok

Coordinate vulnerability assessments or analysis of information security systems.

Claude Opus 4.6 approved at 100
Digital Forensics Analysts
53% ok

Conduct predictive or reactive analyses on security measures to support cyber security initiatives.

Claude Opus 4.6 approved at 100
Information Security Engineers 3.9/5
53% ok

Recommend information security enhancements to management.

Claude Opus 4.6 approved at 100
Information Security Engineers 4.2/5
52% ok

Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.

Claude Opus 4.6 approved at 100
Information Security Engineers 4.4/5
52% ok

Assess the quality of security controls, using performance indicators.

Claude Opus 4.6 approved at 100
LO3

Apply ethical principles and professional standards to cybersecurity scenarios

10 O*NET task matches
Batch:
Penetration Testers
57% ok

Update corporate policies to improve cyber security.

Claude Opus 4.6 denied
Information Security Engineers 3.8/5
54% ok

Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.

Claude Opus 4.6 denied
Digital Forensics Analysts
52% ok

Maintain cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
52% ok

Develop information security standards and best practices.

Claude Opus 4.6 denied
Digital Forensics Analysts
51% ok

Write cyber defense recommendations, reports, or white papers using research or experience.

Claude Opus 4.6 denied
Penetration Testers
49% ok

Develop and execute tests that simulate the techniques of known cyber threat actors.

Claude Opus 4.6 denied
Digital Forensics Analysts
48% ok

Conduct predictive or reactive analyses on security measures to support cyber security initiatives.

Claude Opus 4.6 denied
Digital Forensics Analysts
47% ok

Recommend cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Penetration Testers
46% ok

Identify new threat tactics, techniques, or procedures used by cyber threat actors.

Claude Opus 4.6 denied
Penetration Testers
46% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 denied
LO4

Develop and implement security awareness programs and best practices

10 O*NET task matches
Batch:
Information Security Engineers 3.9/5
70% ok

Develop information security standards and best practices.

Claude Opus 4.6 approved at 100
Information Security Analysts 3.8/5
67% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 100
Penetration Testers
60% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 approved at 100
Computer Systems Engineers/Arc 4.2/5
59% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 100
Information Security Engineers 3.9/5
56% ok

Recommend information security enhancements to management.

Claude Opus 4.6 approved at 100
Database Administrators 3.4/5
56% ok

Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.

Claude Opus 4.6 denied
Web Developers
55% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Web Administrators 4.2/5
55% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Information Security Engineers 3.8/5
55% ok

Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.

Claude Opus 4.6 approved at 100
Information Security Engineers 4.4/5
55% ok

Assess the quality of security controls, using performance indicators.

Claude Opus 4.6 approved at 100
LO5

Assess cybersecurity risks and communicate findings to stakeholders

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)