Syllabus for CYB-220

Defensive Security


Defensive Security studies securing networks from the network administrator’s perspective. Topics include network security, data and host security, compliance and operation security, access control, identity management, and cryptography. The aim is to assess cybersecurity risks to networks, evaluate and select appropriate technologies, and apply prevention and detection strategies to defend networks.



After completing this course, you should be able to:

CO1        Identify cyber threats to computer and network systems and assess their impact.

CO2        Identify and evaluate network devices, media, and topologies.

CO3        Assess cybersecurity risks and apply appropriate risk mitigation strategies.

CO4        Explore the various concepts in network defense.

CO5        Apply networking tools, technologies, defense measures, and protocols to infrastructure network.

CO6        Evaluate the effectiveness of various cryptographic techniques and their impact on security.


The following uCertify course will serve as your virtual textbook for the course:

uCertify provides interactive online courses that help students prepare for various certification exams. In completing your coursework, you will be using parts of the uCertify course as an interactive textbook with chapters and lessons, quizzes, exercises, performance-based labs, and more to aid in learning about topics in cybersecurity.

Access to the uCertify course is provided through the uCertify course: SY0-401 - CompTIA Security+ link located in the uCertify Assignments section of the course website. When you click the link (LTI connector) for the first time, you will be redirected to a paywall that will ask you for a one-time payment. Once you have made your payment, you will have access to the uCertify course and can navigate to specific chapters and lessons (uCertify uses these designations interchangeably) and all associated activities (quizzes, exercises, and labs) through the student dashboard.


Defensive Security is a three-credit, online course consisting of six modules. Modules include overviews of the topics covered, learning objectives, and required study materials. Assignments consist of exercises from the uCertify materials, interactive activities such as discussion forums, quizzes, labs, technical research paper, and final exam. The course is designed to help prepare for the CompTIA Security+ certification exam. 


For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, take a proctored final examination, and complete a 4-stage vulnerability assessment and recommendations project. See below for details.

Consult the Course Calendar for due dates.

Discussion Forums

You will be required to participate in six graded online discussion assignments. There is also one ungraded but required introductions forum in Module 1.

Discussion forums are on a variety of topics associated with the course modules. The purpose of the discussion forums is to help make the connection between the course concepts and the goals of the course. In discussion posts, you express your opinions and thoughts, provide support and evidence for the position(s) you take on a subject, and have the opportunity to ask questions and expand on insights provided by your classmates. Active participation is vital to your overall success in this course.

Located within the Evaluation Rubrics section of the course website is the online discussion forum rubric used to aid in the grading of all online discussion assignments.

uCertify Assignments

In completing your coursework, you will be using parts of the uCertify course; access to the uCertify course is found through the link located in the top section of the CYB-220 course website. In addition to studying one or more lessons each week (completing the flashcards, in-lesson quiz items, and exercises), you are required to submit the results of all lesson quizzes and lesson labs to your mentor for grading.

Lesson Quizzes

Each uCertify lesson includes a lesson quiz. Access the quiz by going to the uCertify Table of Contents and selecting “Quizzes” for that lesson. To receive credit for the quiz, you must score 100% on the quiz when taken in Test mode. You may initially take the quiz in Learn or Review mode, but to receive credit for this activity, you must ultimately score 100% on the quiz when taken in Test mode.

Lesson quizzes are formative activities. You may take them as many times as necessary. At the end of the test, once you have achieved a score of 100%, share your results by downloading the PDF file and submitting it to the mentor using the appropriate assignment link in Moodle.

Lesson Labs

Each uCertify lesson includes performance-based labs. Access the labs by going to the uCertify Table of Contents and selecting “Labs” for that lesson. For each lesson, complete all the labs. Upon completing the labs, you are required to submit your Labs Activities page in PDF, JPG, or PNG file format that shows your completion of each lab and the learning time. You will see the steps to submit the Labs Activities page in module details. To receive credit for this activity, you must successfully complete all labs.

Vulnerability Assessment and Recommendations Project

You are required to complete a Vulnerability Assessment and Recommendations Project in four stages. These four papers will be built on the topics covered in modules that include security vulnerability assessment process, vulnerabilities assessment, network system security recommendations, and application/end-user security recommendations. For detailed requirements for each stage, please refer to the Vulnerability Assessment and Recommendations Project area of the course website.

Turnitin Requirement for Vulnerability Assessment and Recommendations Project 

You are required to submit each paper of four stages of this project to, an academic plagiarism prevention site, prior to submitting each paper within your course space. You will receive immediate written feedback from Turnitin regarding writing style as well as a plagiarism gauge with tips for proper citations. You then have the opportunity to edit your assignment with this feedback in mind and resubmit it to Turnitin for additional checking. Once you are satisfied with the paper, you are required to submit the Turnitin feedback (also known as the originality report)  for the final version along with the paper itself within the course space.

Read carefully the information found at the following link, as it will provide instructions for this requirement:

Turnitin FAQ Web Page

The course ID and password that you will need in order to create an account may be found at the following link. Look within Step 1, locating your course ID and password by semester.

Course ID and Password by Semester 

This information can also be found within Using Turnitin for Assignments. You can locate this document in the topic list area of your course space.

Final Examination

You are required to take one proctored online examinations: a final exam. The exam requires that you use the University's Online Proctor Service (OPS). Please refer to the Examinations and Proctors section of the Online Student Handbook (see General Information area of the course website) for further information about scheduling and taking online exams and for all exam policies and procedures. You are strongly advised to schedule your exam within the first week of the semester.

Online exams are administered through the course website. Consult the Course Calendar for the official dates of exam weeks.

The final exam is 90 minutes long and covers all of the material in the course from Module 1 through Module 6. It consists of multiple-choice questions only.

The exam is closed book; you are not allowed to have any materials with you during your final exam administration.

Statement about Cheating

You are on your honor not to cheat during the exam. Cheating means:

If there is evidence that you have cheated or plagiarized in your exam, the exam will be declared invalid, and you will fail the course.


Your grade in the course will be determined as follows:

All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:






























Below 60

To receive credit for the course, you must earn a letter grade of C or better (for an area of study course) or D or better (for a course not in your area of study), based on the weighted average of all assigned course work (e.g., exams, assignments, discussion postings).


First Steps to Success

To succeed in this course, take the following first steps:

Study Tips

Consider the following study tips for success:


Thomas Edison State University is committed to maintaining academic quality, excellence, and honesty. The University expects all members of its community to share the commitment to academic integrity, an essential component of a quality academic experience.

Students at Thomas Edison State University are expected to exhibit the highest level of academic citizenship. In particular, students are expected to read and follow all policies, procedures, and program information guidelines contained in publications; pursue their learning goals with honesty and integrity; demonstrate that they are progressing satisfactorily and in a timely fashion by meeting course deadlines and following outlined procedures; observe a code of mutual respect in dealing with mentors, staff, and other students; behave in a manner consistent with the standards and codes of the profession in which they are practicing; keep official records updated regarding changes in name, address, telephone number, or e-mail address; and meet financial obligations in a timely manner. Students not practicing good academic citizenship may be subject to disciplinary action including suspension, dismissal, or financial holds on records.

All members of the University community are responsible for reviewing the Academic Code of Conduct Policy in the University Catalog and online at

Academic Dishonesty

Thomas Edison State University expects all of its students to approach their education with academic integrity—the pursuit of scholarly activity free from fraud and deception. All mentors and administrative staff members at the University insist on strict standards of academic honesty in all courses. Academic dishonesty undermines this objective. Academic dishonesty can take the following forms:


Thomas Edison State University is committed to helping students understand the seriousness of plagiarism, which is defined as using the work and ideas of others without proper citation. The University takes a strong stance against plagiarism, and students found to be plagiarizing are subject to discipline under the academic code of conduct policy.

If you copy phrases, sentences, paragraphs, or whole documents word-for-word—or if you paraphrase by changing a word here and there—without identifying the author, or without identifying it as a direct quote, then you are plagiarizing. Please keep in mind that this type of identification applies to Internet sources as well as to print-based sources. Copying and pasting from the Internet, without using quotation marks and without acknowledging sources, constitutes plagiarism. (For information about how to cite Internet sources, see Online Student Handbook > Academic Standards > Citing Sources.)

Accidentally copying the words and ideas of another writer does not excuse the charge of plagiarism. It is easy to jot down notes and ideas from many sources and then write your own paper without knowing which words are your own and which are someone else’s. It is more difficult to keep track of each and every source. However, the conscientious writer who wishes to avoid plagiarizing never fails to keep careful track of sources.

Always be aware that if you write without acknowledging the sources of your ideas, you run the risk of being charged with plagiarism.

Clearly, plagiarism, no matter the degree of intent to deceive, defeats the purpose of education. If you plagiarize deliberately, you are not educating yourself, and you are wasting your time on courses meant to improve your skills. If you plagiarize through carelessness, you are deceiving yourself.

For examples of unintentional plagiarism, advice on when to quote and when to paraphrase, and information about writing assistance and originality report checking, click the links provided below.

Examples of Unintentional Plagiarism

When to Quote and When to Paraphrase

Writing Assistance at Smarthinking

Originality Report Checking at Turnitin

Disciplinary Process for Plagiarism

Acts of both intentional and unintentional plagiarism violate the Academic Code of Conduct.

If an incident of plagiarism is an isolated minor oversight or an obvious result of ignorance of proper citation requirements, the mentor may handle the matter as a learning exercise. Appropriate consequences may include the completion of tutorials, assignment rewrites, or any other reasonable learning tool in addition to a lower grade for the assignment or course. The mentor will notify the student and appropriate dean of the consequence by e-mail.

If the plagiarism appears intentional and/or is more than an isolated incident, the mentor will refer the matter to the appropriate dean, who will gather information about the violation(s) from the mentor and student, as necessary. The dean will review the matter and notify the student in writing of the specifics of the charge and the sanction to be imposed.

Possible sanctions include:

Copyright © 2017 by Thomas Edison State University. All rights reserved.