About the Cyber Studies Consortium

Cyber Foundations I

Cyber Foundations I is a fast-track cyber training curriculum for individuals wishing to pursue entry-level cyber careers. Upon completion of this curriculum, students are ready to take exams for industry certification as well as pursue study in a variety of undergraduate and graduate degree programs. The curriculum explores:

  • Computer hardware, software and networking, including theory, design and application of networks
  • Information and physical security in response to natural disasters, terrorist activities and internal subversions
  • Management of information security for government, corporations and other institutions
  • Introduction to risk assessment and management
  • Introduction to human elements in IT and cybersecurity operations including team dynamics and communications skills

Note: curriculum and course descriptions are accurate at time of initial publication, but are subject to change without notice. Please visit this page periodically to check for any revisions.

Prerequisite Knowledge Requirements

A high school diploma or equivalent is required. Students should have some prior knowledge of computer operations, networking, and other areas in the computer field. Students may demonstrate the knowledge through comprehensive testing or previous experience in the field, or take preparatory courses at a pre-approved or accredited institution.

Cyber Foundations I Courses

Saint Leo University's Undergraduate Certificate in Information Security

  COM 140 - Basic Computer Skills 3 credits

An introduction to computer applications including basic computer concepts and terminology. Students gain hands-on experience in using the operating system and word processing, spreadsheet, presentation management, and database management software. All students are required to take this course if they cannot demonstrate proficiency by passing the Computer Skills Exam or by having taken a suitable substitute at another regionally accredited higher education institution.

Required Courses

  COM 203 - Computer Systems 3 credits

A technical introduction to computer hardware, software, and networking. Hardware includes processor technology, data representation, storage, and I/O devices. Software includes both application and systems software.

Prerequisite or co-requisite: COM 140

  COM 309 - Network Theory and Design 3 credits

An introduction to the theory, design, and application of networks, the course will include the creation or simulation of a computer network. Course fee may apply.

Prerequisite(s): COM 203

  COM 355 - Systems Security 3 credits

Securing the systems that run our computers is the key to ensuring that our essential information remains safe and available. This course provides the essentials to understanding the threats to systems security, the methods to counter those threats, and some practical work in systems security. A computer system with appropriate software will be required.

Prerequisite(s): COM 309 and COM 416

  COM 416 - Introduction to Information Security 3 credits

The advent of global networks has provided communication capabilities for businesses and individuals unparalleled in the history of the world. Attacks on the system that deny service, destroy systems, and purloin information through the use of worms, viruses, and other criminal attacks make it imperative that information security be a significant part of any business plan and that individuals working in that or allied fields become knowledgeable in the principles of information security. This course provides an introduction to the field of information security that lays a necessary foundation for later courses.

Prerequisite(s): COM 309

  COM 420 - Disaster Recovery 3 credits

The threats to information security are manifold, and even the best of security systems can be penetrated in one manner or another. In addition, physical security is another aspect that needs to be considered to secure the systems necessary for business operations to continue. Natural disasters, terrorist activities, and internal subversion can all cause destruction or denial of service. This course provides a framework to understand the threats and counter them.

Prerequisite(s): COM 309 and COM 416

  COM 450 - Network Defense and Security 3 credits

Global and local networks provide capabilities for businesses and individuals that have become essential in the success of the world economy. Defending these systems against attacks through the use of worms, viruses, and other criminal acts is imperative. This course provides a solid foundation in the fundamentals of network security and some hands-on experience in the installation and use of firewalls and intrusion detection systems.

Prerequisite(s): COM 309 and COM 416

  COM 460 - Internet/Intranet Security 3 credits

Access to the Internet for multiple purposes is one of the major components of most business operations. Many businesses also have intranets, which provide internal communications. Security of these assets is imperative for a successful business. This course provides an introduction to the concepts and procedures of assessing and providing security for intranet/intranets.

  COM 470 - Management of Information Security 3 credits

It is imperative that information security be a significant part of any business plan and that managers working in that or allied fields are aware of the principles and methodology of managing information security. This course provides an in-depth view of the management of information security for government, corporations, and other institutions.

Prerequisite(s): COM 309 and COM 416

Cyber Studies Consortium Competency-based Professional Training Courses, Certificate Program

  Risk Assessment and Management

Risk Assessment and Management comprises an essential part of information security and shields business process by recognizing and responding to factors or events that can lead to a failure in the integrity or availability of an information system or a workflow/decision-making process. It identifies and documents vulnerabilities and threats, including physical risks, defines the steps to mitigate risk to business processes or information systems from an accidental or intentional event within a context of prioritizing risks and the appropriate resources.

This course introduces the concept of risk, how risk affects organizational objectives and how a risk management methodology can be used to understand, communicate and address risk. It presents a practical risk management process from risk identification through analysis and monitoring to response and reporting. It also addresses the interaction with other organizational best practices including governance, compliance, audit, continuity and resilience. The course introduces an approach to incorporate risk management in operational strategies, plans and activities, including some typical risk management frameworks and architectures, how responsibilities should be allocated, implementation techniques and how to generate a risk-aware culture. Students will develop and apply risk assessment and management plans for sample organizations.

  Human Process Augmentation for Cyber Security Professionals

This course focuses on the often-ignored human element in information technology and security operations. It provides students with best practices in communication, personality assessment and leadership so they can be effective in team dynamics and fulfilling an organization's information technology and security objectives. Students will explore and practice adaptive team strategies for better analysis and solutions to problem sets.

  Introduction to Global Perspectives - seminar and mini-simulation

Multiple components comprise an understanding of cyber-security. These include legal and policy considerations with a particular focus on the interactions between individuals and corporations with law enforcement and regulatory bodies and the management of these complex relationships. In addition, development of a sophisticated awareness of geo-politics is essential to understanding cyber-security. To that end, the course examines cyber security through three distinct perspectives: law; policy; and geo-politics. In focusing on these three distinct perspectives, class discussion will address cyber-security developments both in the US and internationally; in doing so, how decision makers - government, corporations and individuals - resolve legal, policy and geo-political dilemmas relevant to cyber-security will be examined.

  Field Project

Students will be assigned to participating organizations for field experience as a short-term mentorship or internship. They will have an opportunity to see cyber operations in the host organizations and apply their learned knowledge in practical applications. Subject matter and assignments will vary by the needs and requirements of the respective host organizations.

  Industry Certification

Complete a qualifying exam for industry certification from (ISC)2, CompTIA or similar certifying body.

Print Email