LEARNING RESOURCE 2
TOPIC: CYBER SECURITY
Profile of Intended Learners
Cybersecurity refers to the protection of Internet-connected systems such as hardware, software, networks, and data from cyber attacks. Today’s modern world is considered digitalized. Cybersecurity is one of the fastest growing fields that have called for a great deal of attention. The intended learners for this cybersecurity course are undergraduates who have high analytical skills, passionate about technology, and intrigued by issues related to cybersecurity. Basic computer skills, mathematics, and basic security measures are the critical knowledge needed for learning cybersecurity. Technical and soft skills are essential in learning cybersecurity. Communication and problem-solving knowledge are the current knowledge that learners in the cybersecurity course would need.
A Table Overview of Cyber Security Content
|Introduction to Computing||Learner would be introduced to computers as multipurpose electronic devices. They would learn how the devices receive, process, and store data. They would be taught how to use the together with the internet. Students would also learn the fundamentals of programming, control structures, and data structures.|
|Computer Security||Students would get to learn the techniques to ensure confidentiality, integrity related to disclosure and access of information, and techniques to prevent denial of services. Students would also be required to analyze various protocols and algorithms to facilitate a higher working knowledge of the programming language.|
|Network Security||Learners would learn about protecting the usability and integrity of networks and data. Students would be taught how to analyze security threats exposures, protect systems and data, deployment of firewalls and data encryption to minimize threats. Learners would further be taught how to assess alternative user and host authentication mechanisms to manage risks originating from outside networks.|
|Cisco Networking||Students would get to learn about the Cisco networking syllabus. The major focus of the content would be on routing and switching. Learners would get to be taught about the basic routes and switches of Cisco and explore the boot up process. They would further learn how to explore different configuration modes of routers and how to use the help functions to facilitate efficient navigation of operating systems.|
A Concept Mapping Overview of Learning Activities
A Statement of Learning Theory
Cybersecurity is a computer science topic, and the use of a scientific study of instructional design would be vital to facilitate learning. The constructivism theory would form the basis for the overall instructional design to promote knowledge of the cybersecurity topic. Constructivism would allow the learners to be in control of their learning. For the students to fully benefit from the learning cybersecurity would require the learners to construct their understanding of the topic by experiencing things and reflecting on experience. However, the teacher would manage the control the learning process by guiding the process of knowledge construction. The lecturer would also be responsible for creating group learning activities and posing good problems.
Intended Learning Outcomes
After completion of the topic and participating in the learning activities, the students should be able to:
· Evaluate computer network and information security needs.
· Assess cyber security risk management policies.
· Measure the performance of security systems.
· Troubleshoot, maintain, and update information security systems.
· Monitor networks and provide real-time security solutions.
Instructional Sequence 1
Instructional Sequence 2
Introduction to Computing: The training for students would strictly be hands-on. Everything that would be taught should be interactive by touching areas of interest for the students. Filling out forms and highlighting will be the major practised skills.
Introduction to Computing: Students would be taught through exercise. The mousercise exercise would be majorly used. Copy and paste will be the major skill practised
Computer Security: The instructor will discuss with the students online experiences and educate them on how to minimize potential risks. Student would be required to play online games and compete with students in matching technological tools with risks they can prevent. This facilitates development of analytical skills.
Computer Security: The instructor will provide the students with cyber security sheets and explore them with the students the many tools and strategies that can be used to mitigate negative online experiences. Problem-solving skills would be highly utilized in this section.
Network Security: This class will majorly make use of reading material. The instructor will have to enlighten the students and explain how to enhance security through network design. Students would be required to develop their critical skills.
Network Security: The instructor would make use of PowerPoint slides and video to teach the fundamentals concepts of the topic. The class would also make use of the computer lab to familiarize the students with network security strategies. Critical and analytical development skills would be utilized.
Cisco Networking: The instructor would be required to practically help students learn about the Cisco networking. Students would need to learn how to design, build, and maintain computer networks to facilitate the development of programming skills. Final exam would be taken
Cisco Networking: Instructors would be required to make use of their own notes to teach students about Cisco networking. Hands-on and web based learning experiences would need to be utilized. A skill-based troubleshooting exam would be provided to the students.
Learning Activity: Class simulation of a computer.
Learning Activity: Solving complex puzzle exercises.
Learning Activity: Group discussions and collaborations.
Learning Activity: Group assignments and homework.