/SI110/Info/Learning Outcomes Mapping

The following tables depict learning outcome mappings. An S indicates that the learning outcome on the left (row header) supports the outcome at the top (column header).

Course Learning Outcomes to USNA Core Learning Outcomes

The following table depicts the mapping of course learning outcomes to USNA Core Learning Outcomes.

SI110 Course Learning Outcomes to USNA Core Learning Outcomes
USNA Core Learning Outcomes
Apply Leadership Skills Reason Morally/Ethically Apply Principles of Naval Science & Profession of Arms Solve Technical Problems Communicate Effectively Reason Critically Understand American Heritage Demonstrate Intellectual Curiosity
SI110
Course
Learning
Outcomes
Explain Cyber Domain Importance S S
Describe Computers, OSes, and Networks S S
Analyze Program Output S
Describe Defensible Information Systems S
Perform Cyber Operations S
Describe Cyber Scenarios S

Topic Learning Outcomes to Course Learning Outcomes

The following tables depict the mapping of topic learning outcomes to course learning outcomes; the data are grouped by course section.

SI110 Cyber Battlefield Topic Learning Outcomes to Course Learning Outcomes
Course Learning Outcomes
Explain Cyber Domain Importance Describe Computers, OSes, and Networks Analyze Program Output Describe Defensible Information Systems Perform Cyber Operations Describe Cyber Domain Scenarios
Cyber Domain Describe Aspects Cyber Domain S
Describe Interaction Aspects Cyber Domain S
Cyber Security Explain DoD Cyber Security Model S S
Describe Pillars of Cyber Security Compromises & Mitigations S S
Digital Data Describe Bits, Bytes, Hex, Encodings S
Convert Binary-Decimal S
Determine File's Type S
Explain File Type, File Format, File Header, File Extension S
Computer Architecture Describe computer data input, processing, output S
Identify and describe the major hardware components S
Explain data moves between hardware components S
Descibe computer layer model S
Operating Systems Define purpose of an OS S
Describe OS user/program interfaces S
Explain absolute and relative file system paths S
Perform shell commands on local and remote systems S S
Describe program, process S
Explain OS security roles: accounts, processes, ownership S S
Explain super-user account S S
Programming *** Explain data types, expressions and variables
*** Modify the behavior of simple programs
*** Explain branching and loops
*** Discuss effects of unexpected data input by a user
*** Relate simple JavaScript programs to complex programs
Web Programming Describe www as client-server HTTP S
Explain URL components S
Describe HTML rendered by browser S S
Design a website S
Explain absolute and relative HTML references S
*** Explain client-server for Static Web
*** Explain client-server for Dynamic Web
*** Discuss client-side vs server-side scripts
*** Explain pro's and con's of client and server side scripts
*** Explain the Risk of embedded scripts in e-mail
*** Explain cookie used by web browser and server
*** Explain reflection, injection, and cross-site scripting attacks
*** Analyze Scenerios in terms of Services, Risk, and Forensics
*** Relate Web services to other network services in terms of client-server
Networks *** Explain IP Routing (hosts, packets, routers, IP address)
*** List the layers in the protocol stack of the TCP/IP Model
*** Explain Programs, Protocols, and Hardware used at different TCP/IP layers
*** Describe protocols details (ICMP, HTTP(S), DNS, DHCP, SSH, RDP, SSL/TLS, TCP, UDP, ARP)
*** Describe DNS, including benefits and security Risk
*** Explain IP Address, MAC Address, subnet mask, network address, broadcast address, private address, BSSID, ESSID)
*** Demonstrate network commands (ipconfig/ifconfig, netstat, arp, ping, traceroute, nmap, nslookup, netcat)
*** Deduce network hosts, topology, and services from network commands
*** Use network commands to construct a wired network
*** Use network commands to construct an encrypted wireless network
*** Describe wired and wireless networks
*** Describe encryption on a wireless network (WEP, WPA, WPA2)
*** NO MENTION OF NAT

SI110 Cyber Security Tools Topic Learning Outcomes to Course Learning Outcomes
Course Learning Outcomes
Explain Cyber Domain Importance Describe Computers, OSes, and Networks Analyze Program Output Describe Defensible Information Systems Perform Cyber Operations Describe Cyber Domain Scenarios
Firewalls *** Describe what a firewall does
*** Design a firewall ACL
*** Explain how firewalls balance security vs service
Authentication
and
Cryptography
*** Differentiate elements of cryptography (symmetric and asymmetric encryption, steganography and hashing)
*** Describe symmetric and asymmetric key management
*** Demonstrate representative symmetric and hashing (Vigenere and Rubik's)
*** Describe the users vs. technology's responsibility in cryptography
*** Demonstrate AES and MD5
*** Discuss Password Authentication (password attacks, hashing, salting)
*** Discuss multi-factor authentication
*** Describe PKI
*** Explain frequency analysis, chosen plain text, and man-in-the-middle
*** Demonstrate the use of X.509 certificates
*** Describe X.509 Certificate Authorities
*** Explain steganography techniques and uses
Risk *** Explain what a formal risk assessment process supports
*** Describe the Risk Assessment Process
*** Explain the factors of assessing risk
*** Apply the Risk Assessment Process to Cyber scenerios

SI110 Cyber Operations Topic Learning Outcomes to Course Learning Outcomes
Course Learning Outcomes
Explain Cyber Domain Importance Describe Computers, OSes, and Networks Analyze Program Output Describe Defensible Information Systems Perform Cyber Operations Describe Cyber Domain Scenarios
Digital
Computer
Forensics
*** Describe Locard's Exchange Principle
*** Describe where digital artifacts are left behind
*** Describe and demonstrate the use of MD5 in digital forensics
*** Perform basic digital forensics
*** Analyze digital forensic evidence
Malware *** Classify types of malware (virus, trojan, worm)
*** Describe malware attack vectors (vulnerability, action)
*** Define "zero day"
Phases
of
Cyber
Attack
*** Describe phases of attack (use circle diagrams)
*** Conduct Network Reconnaissance
*** Conduct Network Attack
Computer
Network
Attack
(CNA)
and
Computer
Network
Defense
(CND)
*** Describe Defense-In-Depth
*** Describe CNA
*** Describe CND
*** Conduct Network Defense
Case Studies *** Describe technical and human security failures