Syllabus for CYB-420

CRITICAL INFRASTRUCTURE SECURITY


COURSE DESCRIPTION

Critical Infrastructure Security studies important cybersecurity principles and tools related to critical infrastructure. The course investigates and applies digital security frameworks to various types of utility networks and systems such as information technology (IT), industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems, grids, and distributed networks.

COURSE TOPICS

COURSE OBJECTIVES

After completing this course, you should be able to:

CO1        Study the use and application of programmable logic controllers in automation.

CO2        Examine the components and applications of industrial control systems.

CO3        Compare various control schemes and their differences.

CO4        Evaluate and implement security functionality across an industrial network.

CO5        Analyze and interpret vulnerabilities associated with industrial control systems.

CO6        Scrutinize, discriminate, and recommend the best practices for different industrial control systems.

CO7        Critique industrial control system policies.

CO8        Formulate and hypothesize about the most credible threats to industrial control systems.

COURSE MATERIALS

You will need the following materials to complete your coursework. Some course materials may be free, open source, or available from other providers. You can access free or open-source materials by clicking the links provided below or in the module details documents. To purchase course materials, please visit the University's textbook supplier.

Required Textbook

ISBN-13: 978-0124201149

COURSE STRUCTURE

Critical Infrastructure Security is a three-credit, online course consisting of six modules. Modules include an overview, topics, learning objectives, study materials, and activities. Module titles are listed below.

ASSESSMENT METHODS

For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, and complete a final project. See below for details.

Consult the Course Calendar for due dates.

Promoting Originality

One or more of your course activities may utilize a tool designed to promote original work and evaluate your submissions for plagiarism. More information about this tool is available in this document.

Discussion Forums

You are required to participate in seven discussion forums. Communication with your mentor and among fellow students is a critical component of online learning. Participation in online class discussions involves two distinct activities: an initial response to a discussion question and at least two subsequent comments on classmates' responses.

All of these responses must be substantial. Meaningful participation is relevant to the content, adds value, and advances the discussion. Comments such as "I agree" and "ditto" are not considered value-adding participation. Therefore, when you agree or disagree with a classmate or your mentor, state and support your position.

You will be evaluated on the quality and quantity of your participation, including your use of relevant course information to support your point of view, and your awareness of and responses to the postings of your classmates. Remember, these are discussions: responses and comments should be properly proofread and edited, mature, and respectful.

Written Assignments

You are required to complete six written assignments. The written assignments are on a variety of topics associated with the course modules.

Final Project

You are required to complete a final project, which consists of two parts: a written paper and a PowerPoint with webcam video presentation. The written paper focuses on using the system described in Module 1 and the three common ICS/SCADA vulnerabilities identified in Module 5. You must determine how to implement at least five NIST controls on the system, which will be countermeasures against the identified vulnerabilities. You will prepare and present your findings via PowerPoint with a webcam video presentation.

Please reference the Final Project area of the course website for full details and requirements. Consult the Course Calendar for due dates.

GRADING AND EVALUATION

Your grade in the course will be determined as follows:

All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:

A

=

93–100

C+

=

78–79

A–

=

90–92

C

=

73–77

B+

=

88–89

C–

=

70–72

B

=

83–87

D

=

60–69

B–

=

80–82

F

=

Below 60

To receive credit for the course, you must earn a letter grade of C or better (for an area of study course) or D or better (for a course not in your area of study), based on the weighted average of all assigned course work (e.g., exams, assignments, discussion postings).

STRATEGIES FOR SUCCESS

First Steps to Success

To succeed in this course, take the following first steps:

Study Tips

Consider the following study tips for success:

ACADEMIC POLICIES

To ensure success in all your academic endeavors and coursework at Thomas Edison State University, familiarize yourself with all administrative and academic policies including those related to academic integrity, course late submissions, course extensions, and grading policies.

For more, see:

Copyright © 2019 by Thomas Edison State University. All rights reserved.