Course Description
This course introduces Linux, an operating system commonly used by cybersecurity professionals. It provides an overview of the Linux command line through the Bash shell and how to perform actions such as to navigate and manage the file system and authenticate users. It will also provide an overview of how to interact with a database using SQL. Additionally, the course will build an understanding of how assets are classified. There will be an emphasis on common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. (3 credits)
Prerequisite
- CSS 101: Cybersecurity Fundamentals
Student Learning Outcomes (SLOs)
Upon completion of the course, the students will be able to:
- Explain the relationship between operating systems, applications, and hardware.
- Compare a graphical user interface to a command line interface.
- Identify the unique features of common Linux distributions.
- Navigate and manage the file system using Linux commands via the Bash shell.
- Use Linux commands via the Bash shell to authenticate and authorize users.
- Describe how a relational database is organized.
- Use SQL to retrieve information from a database and apply filters to SQL queries and use joins to combine multiple tables.
- Discuss the role of encryption and hashing in securing assets.
- Describe how to effectively use authentication and authorization.
- Identify and critically assess issues and concepts related to the protection of information and information systems.
- Use risk management principles to assess threats, vulnerabilities, countermeasures, and impact contributions at risk in information systems.
- Explain how common vulnerability exposures are identified by MITRE.
- Analyze an attack surface to find risks and vulnerabilities.
- Identify threats, such as social engineering, malware, and web-based exploits.
Course Activities and Grading
Assignments | Weight |
---|---|
Discussion (Weeks 1-8) | 16% |
Assignment Activities (Weeks 1-8) | 72% |
Labs (Weeks 2, 3, 5, 6) | 12% |
Total | 100% |
Required Textbooks
No required textbook. This course utilizes Coursera and the Google Tools of the Trade: Linux and SQL course which is part of the Google Cybersecurity Certificate program. The first time you access a Coursera course, you will have to set up your Coursera account. Please make sure to use your charteroak.edu email address. It may also ask you to provide a secondary email. You may use a personal email if you wish. Then, enroll in the course.
Course Schedule
Week | SLOs | Readings and Exercises | Assignments |
1 | 1, 2 | Topics: Introduction to Operating Systems
|
|
2 | 3,4 | Topic: The Linux Operating System, Users and Permissions
|
|
3 | 5 | Topic: Linux Commands in the Bash Shell
|
|
4 | 6,7 | Topic: Filesystems, Databases and SQL
|
|
5 | 8 | Topic: Introduction to Asset Security
|
|
6 | 9,10 | Topics: Protect Organizational Assets
|
|
7 | 11,12 | Topics: Vulnerabilities in Systems
|
|
8 | 13,14 | Topics: Threats to Asset Security
|
|
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.