Module Downloads

 

Applied Cryptography

The module available for download below aligns with Learning Outcomes in the NSA "Introduction to Cryptography" knowledge unit, which includes identifying the elements of a cryptographic system; describing the differences between symmetric and asymmetric algorithms; and describing which cryptographic protocols, tools, and techniques are appropriate for a given situation. This module also aligns with Learning Outcomes in the Information Assurance and Security (IAS) knowledge unit of the ACM Computer Science Curricular Guidelines, as well as with the Learning Objectives and Essential Knowledge Statements in the AP CSP framework, Big Idea 6: The Internet. 

The Applied Cryptography module has been pilot-tested in the following courses: COSC 1301, Computers and Technology; COSC 1437, Programming Fundamentals II; CS 150, Computer Science I; and CST 101, Introduction to Information Systems.

 

Download compressed file (8.6 MB)

 

Secure Scripting

The module available for download below aligns with Learning Outcomes in the NSA "Basic Scripting" knowledge unit, which includes demonstrating proficiency in scripting languages to write simple scripts (e.g., to automate system administration tasks). This module also aligns with Learning Outcomes in the Software Development Fundamentals (SDF) knowledge unit of the ACM Computer Science Curricular Guidelines, as well as with the Learning Objectives and Essential Knowledge Statements for Big Ideas 1–5 in the AP CSP framework (Creativity, Abstraction, Data and Information, Algorithms, and Programming). 

The Secure Scripting module has been pilot-tested in the following courses: ITSE 1350, System Analysis and Design; CSC 240, Introduction to Different Programming Languages; NTWK 2013, Introduction to Networking; CIS 215, Operating Systems; and CSC 200, Introduction to Computer Science. 

 

Download compressed file (3.9 MB)

 

Responsible Software Development

The module available for download below aligns with Learning Outcomes in the NSA "Fundamental Security Design Principles" and "Basic Scripting" knowledge units, which include describing why each principle is important to security and how it enables development of security mechanisms that can implement desired security policies. This module also aligns with Learning Outcomes in the Information Assurance and Security (IAS) and Software Development Fundamentals (SDF) knowledge units of the ACM Computer Science Curricular Guidelines, as well as with Essential Knowledge Statements in the AP CSP framework, Big Idea 5: Programming. 

The Responsible Software Development module has been pilot-tested in the following courses: COSC 1301 Computers and Technology; CSCI 110, Principles of Computer Science; CSC 100, Introduction to Programming and C++; CSC 110, Introduction to Programming and Java; Prog 1003, Introduction to Programming Logic; and CS 102, Programming Fundamentals.

 

Download compressed file (4.6 MB)

 

 

DRAFT: Cybersecurity Principles

The draft module available for download below aligns with Learning Outcomes in the NSA "Fundamental Security Design Principles" knowledge unit, which focuses on twelve first principles of security: Separation (of domains), Isolation, Encapsulation, Least Privilege, Simplicity (of design), Minimization (of implementation), Fail Safe Defaults / Fail Secure, Modularity, Layering, Least Astonishment, Open Design, and Usability. This module also aligns with Learning Outcomes in the Information Assurance and Security (IAS) knowledge unit of the ACM Computer Science Curricular Guidelines, as well as with Learning Objectives and Essential Knowledge Statements in the AP CSP framework, Big Idea 6, The Internet. 

 

Download compressed file (14.6 MB)

 

 

DRAFT: Cybersecurity and Society

The draft module available for download below aligns with Learning Outcomes in the NSA "Policy, Legal, Ethics, and Compliance" knowledge unit. This module also aligns with Learning Outcomes in the Social Issues and Professional Practice (SP) knowledge unit of the ACM Computer Science Curricular Guidelines, as well as with Learning Objectives and Essential Knowledge Statements in the AP CSP framework, Big Idea 7, Global Impact. 

 

Download compressed file (3.4 MB)

 

 

DRAFT: Securing Risky Data

The draft module available for download below aligns with Learning Outcomes in the NSA "Fundamental Security Design Principles," "Cyber Defense," and "IA Fundamentals" knowledge units. This module also aligns with Learning Outcomes in the Information Assurance and Security (IAS) and Human-Computer Interaction (HCI) knowledge units of the ACM Computer Science Curricular Guidelines, as well as with Learning Objectives and Essential Knowledge Statements for Big Ideas 3, 6, and 7 in the AP CSP framework (Data and Information, The Internet, and Global Impact). 

 

Download compressed file (39.9 MB)

 

 

DRAFT: Cyber Threats and Countermeasures

The draft module available for download below aligns with Learning Outcomes in the NSA "Cyber Defense," and "Cyber Threats" knowledge units. This module also aligns with Learning Outcomes in the Information Assurance and Security (IAS) knowledge unit of the ACM Computer Science Curricular Guidelines, as well as with Learning Objectives in the AP CSP framework, Big Idea 6: The Internet. 

 

Download compressed file (2.5 MB)