Apr 26, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 490 - CIS Internship in Cyber Design & Implementation

10 Credits
In this course, students create business scenarios, cyber situations, design and build the network architecture and perform threat analysis for the regional cyber competition. The best scenario will be voted on and implemented for the competition. The competition is meant to be real world for the competitors. Having to design a business network for use in a competition gives students an in-depth knowledge of what can go wrong and network vulnerabilities. This course can be taken in lieu of or in combination with CIS 480 for a minimum of 5 credits and maximum of 10 credits total over the course of the BAS in Cybersecurity and Forensics.

Instructor Permission Required Yes
Program Admission Required Yes Admitted Program BAS - CIS
Course Note This course provides a practical alternative to industry internship.
FeesCF HD

Quarters Typically Offered
Summer Day
Fall Day
Winter Day
Spring Day

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20190619T15:16:23

Grading Basis Decimal Grade
Variable Credit Yes Range 1-10
OEE Yes
Class Limit 99
Contact Hours: Independent Studies 300
Total Contact Hours 300
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  • What are the components of a cyber competition or invitational?
    • ​Understanding the National Initiative for Cybersecurity Education framework
    • ​Past competitions
  • Common business scenarios and network architecture
  • Research of existing and legacy operating systems
    • ​Known Vulnerabilities
    • ​Known exploits
    • ​Windows, Linux, Macintosh, other
  • Research of common web based vulnerabilities
  • Research of common mobile vulnerabilities
  • Service Level Agreements
  • Common Business practices
  • Leadership
  • Meeting Deliverables
  • Current cyber threats


Student Learning Outcomes
Design a network, with security measures, vulnerabilities, etc. for chosen scenario

Select and apply the parts of the NICE standards to the competition

Incorporate known vulnerabilities and exploits of existing and legacy operating systems along with web based applications into the competition network design

Exploit common mistakes made by network administrators and users

Design a service level agreement for a website, email service, cloud service, etc.

Design and test business injects to demonstrate compliance with various standards such as PCI or HIPAA which may affect network design or business decisions

Perform assigned tasks in a friendly and courteous manner and accept feedback

Communicate effectively with individuals and in a team environment

Demonstrate successful work habits and attitudes reflecting best practices in the workplace

Analyze problems and choose appropriate solutions, seeking clarification when necessary



Add to Portfolio (opens a new window)