Course Course Summary Section 1 Content Section 1 Content Left Section 1 Content Right Credit Type: Course ACE ID: TEEX-0250 Organization's ID: CYB101 Organization: Texas A&M Engineering Extension Service Location: Online Length: 1 week (33 hours) Dates Offered: 11/1/2022 - 10/31/2025 12/1/2018 - 10/31/2022 9/1/2012 - 11/30/2018 Credit Recommendation & Competencies Section 2 Content Section 2 Content Left Section 2 Content Right Level Credits (SH) Subject Lower-Division Baccalaureate 4 Cybersecurity Students must complete TEEX-0277, TEEX-0278, and TEEX-0279 to receive credit for this course. Description Section 3 Content Section 3 Content Left Section 3 Content Right Objective: The course objective is to provide students the fundamentals of computer crime issues from a legal perspective and the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. Learning Outcomes: Identify laws that combat intellectual property cybercrimes such as copyright infringement, unauthorized access of data or systems, and cyber fraud Identify issues involving trademarks, domain names, and websites, including the domain name registration process, hyperlinking and copyright infringement, cybersquatting, trademark infringement, the role of The Internet Corporation for Assigned Names and Numbers (ICANN), and laws such as the Anti-Cybersquatting Consumer Protection Act and the Federal Trademark Dilution Act Describe Internet fraud issues such as identity theft, the prevention and avoidance of identity theft, and the Identity Theft and Assumption Deterrence Act Discuss topics that are not discussed in other areas of the course, such as the involvement of free speech and child pornography, online gambling in the United States, hate speech on the Internet, anti-hacking and anti-spyware laws, and legal liability for cyber security, including laws such as the Communications Decency Act, the Children's Online Privacy Protection Act, the United States Unlawful Internet Gambling Identify fundamental concepts, terms, ideas required for an informed discussion on ethical topics, and an overview of ethical business practices Identify defensive techniques and federal laws that defend privacy and discuss consent and how industry self-regulation impacts privacy Define what an intellectual object is, how intellectual objects differ from traditional (physical) objects, and how those objects may be owned Identify anti-virus software, personal firewalls, Operating System (OS) variants, and securing the OS on a new computer Discuss the varying types of malicious software that can be encountered on the Internet as well as general strategies for identifying and neutralizing these programs Identify encryption, and how to use encryption to successfully protect your data, even when your computer is stolen, as well as various strategies that can be used to ensure the physical security of your computer Identify safe browsing and the consequences that can result from failing to use safe browsing habits Explain the legal issues behind Internet regulations, online contracting, consumer protection, employee privacy, online marketing, as well as the roles and involvement of such organizations as the Federal Trade Commission and the International Chamber o Discuss electronic evidence and discovery, including the validity and discovery of electronic evidence in cybercrimes, The USA Patriot Act, search and seizure restrictions and how they affect search engines and Internet service providers, the production of confidential business information, the Federal Rule of Civil Procedure amendments, the protection of confidential data and trade secrets, as well as computer security, incident response, and legal liability Identify what privacy is, who has it, who is entitled to it, and what threatens it Identify differing electronic means commonly used to gather data and threaten personal privacy Discuss U.S. copyright law, how copyrights are obtained, under what circumstances a copyright may be applied to computer software, patents, trade secrets, and trademarks, explaining the differences between those protections and copyrights, and other intellectual property issues Discuss why professional codes of conduct are important for cyber security professionals, commonly used and invoked professional codes, employer/employee relationships and the impact those relationships have on the practice of 'whistle-blowing', responsibility, accountability, and liability as they relate to professional codes of conduct Review issues surrounding speech on the Internet and the associated legal concerns, cyber-squatting, spam, censorship, varying forms of speech that some argue are protected and defamation on the Internet Discuss hacking and the two main categories of hackers, 'black hat' hackers and their motivations and characteristics, 'white hat' hackers and an examination of the key differences between white hat and black hat hackers, 'hacktivism', cyber crime, cyber-terrorism, and how those acts are similar and dissimilar Discuss peer-to-peer (P2P) file sharing and the risks (technological and legal) that can come with the use of P2P software Identify the basics of networking, securely setting up and running small computer networks, firewalls, wired and wireless network configuration, wireless encryption standards, generating strong passwords/network keys, and typical attacks that might be launched against your network Summarize the use of encryption to secure data being transmitted over a computer network, as well as information security best practices and guidelines Discuss techniques for purging cookies and browser cache, as well as social engineering attacks and how to identify and defeat them General Topics: Internet regulations Federal Trade Commission and the International Chamber of Commerce The Computer Fraud and Abuse Act, The Wire Fraud Act, The National Stolen Property Act, and The Copyright Act The Anti-Cybersquatting Consumer Protection Act and the Federal Trademark Dilution Act Tactics, detection, and prevention of online retail sales fraud and email fraud Internet business opportunity and investment fraud warning signs Online auction fraud The Communications Decency Act, the Children's Online Privacy Protection Act, the United States Unlawful Internet Gambling Privacy Intellectual objects U.S. copyright law Professional codes of conduct for cyber security professionals Hacking Anti-virus software, personal firewalls, and operating system variants Malicious software Peer-to-peer (P2P) file sharing Encryption Networking basics Safe e-mail habits Instruction & Assessment Section 4 Content Section 4 Content Left Section 4 Content Right Instructional Strategies: Audio Visual Materials Computer Based Training Methods of Assessment: Examinations Quizzes Minimum Passing Score: 70% Supplemental Materials Section 5 Content Section 5 Content Left Section 5 Content Right Section 6 Content Section 6 Content Left Section 6 Content Right Button Content Rail Content 1 Other offerings from Texas A&M Engineering Extension Service Backflow Prevention Assembly Tester’s School (TEEX-0308) Basic Criminal Investigation (TEEX-0292) Basic Criminal Investigation Online (TEEX-0299) Basic Property Technician (BPT) Online (TEEX-0294) Basic Wastewater Operations (TEEX-0267) Bloodstain Pattern Analysis (BPA) (TEEX-0290) Courtroom Testimony Practical Applications (TEEX-0304) Crime Scene Investigation (TEEX-0293) Customer Service Inspector/Cross-Connection Control (TEEX-0307) Cyber Ethics (TEEX-0278) View All Courses Page Content