0% found this document useful (0 votes)
13 views8 pages

SE1752 Introduction To Cybersecurity

The document outlines the course structure for 'Introduction to Cybersecurity' (SE1752) at Al-Baha University, detailing its objectives, learning outcomes, and assessment methods. It includes information on course content, teaching strategies, and required resources, emphasizing the importance of cybersecurity fundamentals and ethical considerations. The course is a required part of the Bachelor of Software Engineering program and includes various assessment activities such as quizzes, a midterm, and a final exam.

Uploaded by

abu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views8 pages

SE1752 Introduction To Cybersecurity

The document outlines the course structure for 'Introduction to Cybersecurity' (SE1752) at Al-Baha University, detailing its objectives, learning outcomes, and assessment methods. It includes information on course content, teaching strategies, and required resources, emphasizing the importance of cybersecurity fundamentals and ethical considerations. The course is a required part of the Bachelor of Software Engineering program and includes various assessment activities such as quizzes, a midterm, and a final exam.

Uploaded by

abu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Course Title: Introduction to Cybersecurity

Course Code: SE1752

Program: Bachelor of Software Engineering

Department: Software Engineering

College: Faculty of Computers and Informatics

Institution: Al-Baha University

Version: 1.0

Last Revision Date: 23/4/2024


Table of Contents
A. General information about the course: ................................................................ 3
B. Course Learning Outcomes (CLOs), Teaching Strategies and Assessment
Methods .................................................................................................................... 4
C. Course Content ...................................................................................................... 6
D. Students Assessment Activities ............................................................................ 6
E. Learning Resources and Facilities .......................................................................... 7
F. Assessment of Course Quality ............................................................................... 7
G. Specification Approval .......................................................................................... 7

2
A. General information about the course:

1. Course Identification
1. Credit hours: ( ……… )

2. Course type
A. ☐University ☐College ☒ Department ☐Track ☐Others
B. ☒ Required ☐Elective
3. Level/year at which this course is offered: ( 9 )
4. Course general Description:
Overview of the evolving cyberspace ecosystem, the interoperability of physical
and social networks, and methods and techniques in securing that ecosystem.
Explore briefings of the ethical, legal, and technical aspects of cybercrime and
methods of prevention, detection, response and recovery. The value of strong
moral character, integrity, and trust as prized attributes of cybersecurity
practitioners will be highlighted. Essential cybersecurity topics overview including
operating system models and mechanisms for mandatory and discretionary
controls, data models, basic cryptography and its applications, security in
computer networks and distributed systems, inspection and protection of
information assets, detection of and reaction to threats to information assets, and
examination of pre- and postincident procedures, technical and managerial
responses, information security planning and staffing functions, data mining and
data science, and policy and assurance issues. Being prepared as life-long learner
tailored to their academic/career goals.

5. Pre-requirements for this course (if any):

Software Security (SE1507)

6. Pre-requirements for this course (if any):

none

7. Course Main Objective(s):

3
Teaching Cybersecurity fundamentals to be motivated to begin career as
Cybersecurity professional.

2. Teaching mode (mark all that apply)


No Mode of Instruction Contact Hours Percentage
1 Traditional classroom 3 100%
2 E-learning
Hybrid
3 • Traditional classroom
• E-learning
4 Distance learning

3. Contact Hours (based on the academic semester)


No Activity Contact Hours
1. Lectures 33
2. Laboratory/Studio
3. Field
4. Tutorial
5. Others (specify)
Total 33

B. Course Learning Outcomes (CLOs), Teaching Strategies and Assessment


Methods

Course Learning Code of CLOs aligned Teaching Assessment


Code
Outcomes with program Strategies Methods
1.0 Knowledge and understanding
Recognize K1
knowledge of Course lectures,
cybersecurity tutorials,
1.1 Quiz, Exam
concepts and HomeWorks, term
terminology as well project
as get idea

4
Course Learning Code of CLOs aligned Teaching Assessment
Code
Outcomes with program Strategies Methods
about digital
forensics and
available tools to
serve its
applications.
Describe needs to K2
secure information
Course lectures,
while preserving
tutorials,
1.2 legal and regulatory Quiz, Exam
HomeWorks, term
requirements in
project
Saudi Arabia and
Internationally.
Describe generally K3
Course lectures,
the vulnerabilities
tutorials,
1.3 and sources of Quiz, Exam
HomeWorks, term
attack risking digital
project
systems.
2.0 Skills
Employ basic S1
security principles
and practices
integrated to
knowledge of
Tutorial
2.1 computing and HomeWorks
Term project
information
technologies to
serve against
cybersecurity
problems
Analyze in very S2
simplified manner
the cyber
Tutorial
2.2 computing-based HomeWorks
Term project
solution to protect
information under
risks situations.
Analyze generally S3
Tutorial
2.3 the legal and HomeWorks
Term project
regulatory

5
Course Learning Code of CLOs aligned Teaching Assessment
Code
Outcomes with program Strategies Methods
requirements
related to
cybersecurity
computer systems
and digital evidence.
Function orally to S4 Open Related
Oral
accomplish common Topic General
presentation
goals. Coverage
3.0 Values, autonomy, and responsibility
Engage in lifelong V1
learning for Open Related
Oral
3.1 continued Topic General
presentation
professional Coverage
excellence.

C. Course Content
No List of Topics Contact Hours
1. Introduction to Cybersecurity specialization 5
2. Cybersecurity Fundamentals and CIA 5
3. Cyberthreat Prevention, Detection, Recovery 6
4. Enterprise Architecture and Components 6
5. Information System Governance and Risk Assessment 6
6. Incident Management 5
Total 33

D. Students Assessment Activities

Assessment
Percentage of Total
No Assessment Activities * timing
Assessment Score
(in week no)
1. Quizzes 3, 8 10%
2. Midterm 6 25%
3. HomeWorks 10 10%
4. Oral presentation 10 20%
5. Final Exam 12 35%
*Assessment Activities (i.e., Written test, oral test, oral presentation, group project, essay, etc.).

6
E. Learning Resources and Facilities

1. References and Learning Resources


Introduction to Cyber Security: Fundamentals By Ugo Ekpo, 2018
Essential References
- ISBN: 978-1728711621
Supportive References N/A
Electronic Materials Rafid
Other Learning Materials N/A

2. Required Facilities and equipment


Items Resources
facilities Classroom
(Classrooms, laboratories, exhibition rooms,
simulation rooms, etc.)
Technology equipment Data show, Software
(projector, smart board, software)
Other equipment N/A
(depending on the nature of the specialty)

F. Assessment of Course Quality


Assessment Areas/Issues Assessor Assessment Methods
Effectiveness of teaching - Student - Survey
Effectiveness of
- Lecturer - Annual report
Students assessment
- Survey
- Evaluation of test
Quality of learning resources - Program Coordinator
- Models
Standard sample
The extent to which CLOs have
been achieved
Other
Assessors (Students, Faculty, Program Leaders, Peer Reviewer, Others (specify)
Assessment Methods (Direct, Indirect)

G. Specification Approval
COUNCIL /COMMITTEE Curriculum Committee

REFERENCE NO.

7
DATE 28 April 2024

You might also like