Go To...
Cybersecurity

News & Events

The UVI CECOR Program Presents the First Cybersecurity Class

UVI has made its first stride to prepare cybersecurity experts by developing a Selected Topics in Cybersecurity Class in the spring term of 2016. Information on the course is provided below. 

CSC 465: Selected Topics in Cybersecurity 
Department of Computer and Computational Sciences
College of Science and Mathematics
University of the Virgin Islands
Course Syllabus

Instructor: Dr. Jason Lewis Term: Spring, 2016
Office: CA Building, Room 113 Class Meeting Days: MWF
Phone: 340-693-1253 Class Meeting Hours: 11:00 am - 11:50 am
E-Mail: jason.lewis@uvi.edu Class Location: TED 103 (STT)
                         EVC 807 (STX)
Office Hours: MW: 2:15 pm - 4:15 pm,
                     T: 9:00 am - 12:00 pm 
                     or by Appointment
Course Overview:
  • Course Description:This course uses class discussions to develop the students understanding of the broad field of cybersecurity. Students will be required to study definitions and cybersecurity theory, as well as to review case studies before class. Students and the instructor will discuss the roles of the cyber-defender, the cyber-attacker, and the victim in the context of our interconnected world. The relationship between prevention, detection, and investigation will be studied and considered from a political, technological, economical, and criminal justice perspective.The student will gain valuable hands-on experience by completing a semester long project
  • Course Overview: Almost every day a new cyber-attack is revealed.  With our modern interconnectedness these cyber-attacks are affecting more and more of us and they are becoming even more difficulty and costly to defend against and to detect.  For these reasons we need a new core of cyber-defenders; individuals who are trained in the field of cybersecurity.

This course will be your introduction into the world of cybersecurity.  It will cover topics such as modern cybercrime, cyberterrorism, and cyberwar.  These topics will be explored from a technical perspective; explaining not only what it takes to commit one of these acts, but what it takes to defend against and detect such acts.

  • Course Goals: The goals of this course are:
    • Students will gain an understanding of the field of cybersecurity, along with its constituent subfields, and
    • Students will gain an appreciation for the need of highly trained cybersecurity professionals.
  • Course Objectives:  The learning objectives of this course are:
  • Students will gain an appreciation for the need of highly trained cybersecurity professionals.
  • Students will read various case studies describing cybersecurity incidents.
  • Students will conduct a semester long project in order to obtain “hands on” experience in the field of cybersecurity.
  • Course Learning Outcomes:  The learning outcomes that will be assessed during this course are:
    • When presented with key technology that is utilized in the field of cybersecurity, the students will be able to describe the proper use of said technology. (ABET Program Learning Outcome I)
    • When presented with a subfield of cybersecurity, the students will be able to define the key components of the subfield, as well as compare and contrast the given subfield with various other subfields of cybersecurity. (ABET Program Learning Outcome A)
    • The students will be able to identify the emerging threats to cyber-resources based on readings, case studies, personal experiences, and/or media coverage. (ABET Program Learning Outcome B & G )
    • When given a case study, the students will be able to describe various techniques in order to defend from, detect, and investigate the cyber-attack described in said case study. (ABET Program Learning Outcome B & I)

  • Course Prerequisites: The prerequisites for this course are:
  • CSC 243 (Digital Communications and Networks) or IST 315 (Data Communications and Network Management), and Junior standingOR
  • Permission of the instructor.
  • Course Credits: This course has three (3) credits associated with it.
  • Required Texts and Materials: This course requires the following textbook:
Title: Digital Crime and Digital Terrorism
Edition: Third
Authors: Robert W. Taylor, Eric J. Fritsch, and John Liederbach
Print ISBN: 9780133458909
E-Book ISBN: 9780133458978
E-Book Website: http://www.coursesmart.com
  • Course Topical Outline:The following is the tentative topical outline for this course and it is subject to change:
    1. Introduction and Overview of Cybersecurity, Cyber Crime, and Cyber Terrorism.
    2. Cyber Terrorism and Information Warfare.
    3. The Criminology of Computer Crime.
    4. Hackers.
    5. Sophisticated Cyber Criminal Organizations.
    6. White-Collar Crimes.
    7. Viruses and Malicious Code.
    8. Sex Crimes and Obscenity on the Internet.
    9. Anarchy and Hate on the Internet.
    10. Digital Laws.
    11. Law Enforcement Roles and Response.
    12. The Investigation of Computer-Related Crime.
    13. Digital Forensics.
    14. Information Security and Infrastructure Protection.
    15. Information Assurance