CYBR303 — Computer and Information Security

3 credits Catalog-Derived

Computing security including threat types, virus/malware infection, and defensive techniques such as OS security, email security, internet security, browser tools, and firewalls with hands-on practice.

5
Objectives
30
Matches
30
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
67.7% Penetration Testers 21t
57.6% Computer Systems Engineers/Architec 20t
67.7% Information Security Engineers 20t
60.3% Web Administrators 17t
50.8% Software Quality Assurance Analysts 16t

Learning Objectives & Matches

LO1

Configure and harden operating system security settings and policies

10 O*NET task matches
Batch:
Telecommunications Engineering 4.1/5
69% ok

Implement controls to provide security for operating systems, software, and data.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
56% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 300
Information Security Analysts 4.1/5
56% ok

Modify computer security files to incorporate new software, correct errors, or change individual access status.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.4/5
52% ok

Provide technical support to computer users for installation and use of security products.

Claude Opus 4.6 approved at 300
Network and Computer Systems A 3.7/5
51% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 approved at 300
Information Security Analysts 3.8/5
51% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 300
Computer Network Support Speci 4.4/5
50% ok

Configure security settings or access permissions for groups or individuals.

Claude Opus 4.6 denied
Web Administrators 4.5/5
47% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
Information Security Engineers 3.7/5
47% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 200
Database Administrators 3.9/5
47% ok

Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.

Claude Opus 4.6 denied
LO2

Deploy and manage firewall and intrusion detection/prevention systems

10 O*NET task matches
Batch:
Computer Network Architects 4.3/5
57% ok

Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.

Claude Opus 4.6 approved at 300
Web Developers
55% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Network and Computer Systems A 3.7/5
53% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 approved at 300
Web Administrators 4.8/5
53% ok

Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.

Claude Opus 4.6 denied
Information Security Analysts 3.8/5
53% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.7/5
52% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 300
Digital Forensics Analysts
52% ok

Analyze log files or other digital information to identify the perpetrators of network intrusions.

Claude Opus 4.6 approved at 300
Web Administrators 4.2/5
51% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Penetration Testers
51% ok

Conduct network and security system audits, using established criteria.

Claude Opus 4.6 approved at 300
Penetration Testers
50% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 approved at 200
LO3

Analyze malware behavior, infection vectors, and remediation strategies

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
LO4

Implement defensive security measures including antivirus, endpoint protection, and access controls

10 O*NET task matches
Batch:
Digital Forensics Analysts
58% ok

Conduct predictive or reactive analyses on security measures to support cyber security initiatives.

Claude Opus 4.6 approved at 300
Information Security Engineers 4.4/5
54% ok

Assess the quality of security controls, using performance indicators.

Claude Opus 4.6 approved at 300
Web Administrators 4.2/5
53% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Penetration Testers
53% ok

Identify new threat tactics, techniques, or procedures used by cyber threat actors.

Claude Opus 4.6 approved at 300
Penetration Testers
53% ok

Develop presentations on threat intelligence.

Claude Opus 4.6 approved at 300
Penetration Testers
52% ok

Update corporate policies to improve cyber security.

Claude Opus 4.6 denied
Information Security Engineers 3.8/5
52% ok

Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.9/5
51% ok

Recommend information security enhancements to management.

Claude Opus 4.6 approved at 300
Computer Network Architects 4.3/5
51% ok

Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.7/5
50% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 300
LO5

Conduct vulnerability assessments and security audits of computer systems

0 O*NET task matches
Batch:
No O*NET task matches for this objective.

10-Week Syllabus

Lectures (5 sessions)
  • Mon Course overview, CIA triad, security terminology
  • Tue Threat actors: nation-states, criminal orgs, insiders, hacktivists
  • Wed Attack lifecycle: reconnaissance through exfiltration
  • Thu Common vulnerability types: CVEs, CWEs, CVSS scoring
  • Fri Lab introduction: virtual lab environment setup (VMs, networking)
Labs
  • Set up Kali Linux and Windows Server VMs in VirtualBox/VMware
  • Configure isolated virtual network with pfSense gateway
Assignment

Research and present a recent CVE from NVD with CVSS analysis

Lectures (5 sessions)
  • Mon Linux security model: DAC, users/groups, file permissions
  • Tue Linux hardening: unnecessary services, SSH configuration
  • Wed SELinux/AppArmor: mandatory access controls
  • Thu Linux audit framework: auditd, log analysis
  • Fri Friday quiz on Week 1-2 fundamentals
Labs
  • Harden a Linux server against CIS Benchmark Level 1
  • Configure SELinux policies and verify enforcement
Assignment

Complete CIS Benchmark checklist for Ubuntu Server; document all changes with justification

Lectures (5 sessions)
  • Mon Windows security model: NTFS, ACLs, UAC
  • Tue Group Policy Objects: password policies, account lockout, audit policies
  • Wed Windows Defender, AppLocker, BitLocker configuration
  • Thu Active Directory security fundamentals
  • Fri Hands-on: GPO lab walkthrough
Labs
  • Configure Windows Server Group Policy for a domain
  • Implement AppLocker application whitelisting
Assignment

Design a GPO security template for a small business (10 workstations, 2 servers)

Lectures (5 sessions)
  • Mon Network security architecture: DMZ, segmentation, defense in depth
  • Tue Firewall types: packet filtering, stateful, application-level
  • Wed iptables/nftables: chain traversal, rule construction
  • Thu Network Address Translation and port forwarding
  • Fri Lab: building firewall rulesets
Labs
  • Configure iptables rules for a multi-zone network
  • Implement NAT and port forwarding for a web server
Assignment

Design a firewall ruleset for a 3-tier web application (web/app/database zones)

Lectures (5 sessions)
  • Mon IDS vs IPS: detection methodologies (signature, anomaly, heuristic)
  • Tue Snort architecture: rules, preprocessors, output modules
  • Wed Suricata: multi-threaded detection, EVE JSON logging
  • Thu SIEM integration: log aggregation and correlation
  • Fri Midterm exam review
Labs
  • Deploy Snort with custom rules to detect common attacks
  • Configure Suricata and analyze EVE JSON alerts
Assignment

Write 5 custom Snort rules to detect specific attack patterns from provided PCAPs

Lectures (5 sessions)
  • Mon MIDTERM EXAM (covers weeks 1-5)
  • Tue Malware taxonomy: viruses, worms, trojans, ransomware, rootkits
  • Wed Static analysis: file headers, strings, imports, PE structure
  • Thu Dynamic analysis: sandboxing, behavioral monitoring
  • Fri Anti-analysis techniques: packing, obfuscation, anti-VM
Labs
  • Analyze a malware sample using static tools (strings, PEview, pestudio)
  • Execute malware in REMnux sandbox and document behavior
Assignment

Write a malware analysis report for a provided sample following MAEC format

Lectures (5 sessions)
  • Mon Vulnerability lifecycle: discovery, disclosure, patching
  • Tue Scanning tools: Nessus, OpenVAS, Qualys architecture
  • Wed Scan configuration: credentialed vs uncredentialed, scope
  • Thu False positive identification and validation
  • Fri Remediation prioritization using CVSS and business context
Labs
  • Run Nessus vulnerability scan against lab network
  • Validate findings and produce a prioritized remediation report
Assignment

Conduct a full vulnerability assessment of the lab environment and produce an executive summary + technical report

Lectures (5 sessions)
  • Mon Email security: SPF, DKIM, DMARC, phishing detection
  • Tue Web security: HTTPS, TLS configuration, certificate management
  • Wed Browser security: same-origin policy, CSP, cookie security
  • Thu Web application firewalls: ModSecurity, OWASP CRS
  • Fri Secure communication tools and practices
Labs
  • Configure TLS certificates and verify with SSL Labs
  • Deploy ModSecurity WAF with OWASP Core Rule Set
Assignment

Assess a web application for OWASP Top 10 vulnerabilities using browser developer tools and document findings

Lectures (5 sessions)
  • Mon Security monitoring: log sources, baselines, anomaly detection
  • Tue Incident response lifecycle: NIST SP 800-61 framework
  • Wed Evidence collection and chain of custody
  • Thu Incident documentation and post-incident review
  • Fri Threat intelligence: IOCs, STIX/TAXII, threat feeds
Labs
  • Analyze SIEM logs to detect and triage a simulated attack
  • Execute incident response procedures for a simulated breach
Assignment

Write an incident response plan for a small organization following NIST SP 800-61

Lectures (5 sessions)
  • Mon Security assessment methodologies: NIST CSF, ISO 27001
  • Tue Compliance frameworks: HIPAA, PCI-DSS, SOC 2 overview
  • Wed Career paths in cybersecurity: certifications, roles, growth
  • Thu Course review and final exam preparation
  • Fri FINAL EXAM
Labs
  • Conduct a comprehensive security assessment of the lab network
  • Present findings and remediation plan to class
Assignment

Final project: Complete security assessment report with executive summary, technical findings, and remediation roadmap

Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)