Skip to Content
College of Arts and Sciences

Cybersecurity Certificate Outcomes

Outcomes and AssessmentSeton Hall University embraces the principle that effective and meaningful assessment is an integral part of the educational process. This principle is at the heart of our commitment to meet our responsibilities to our students, professions, and the communities that we serve.

University Assessment Site »

Program-Level Learning Outcomes (Student Outcomes)

Graduates of the program will have an ability to:

  1. Analyze a broadly defined problem in the program’s domain and apply principles of the discipline to identify solutions,
  2. Design and implement solutions to meet a given set of computing requirements in the context of the program’s discipline,
  3. Communicate effectively in a variety of professional contexts,
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles, and
  5. Function effectively as a member of a team engaged in activities appropriate to the program’s discipline.
  6. Apply security principles and practices to maintain operations in the presence of risks and threats.

CAE-CD Knowledge Unit Aligned Courses

Course Learning Objectives

ISCI 1110 Introduction to Cybersecurity

Upon completion of the course, students should be able to:

Cybersecurity Foundations (CSF)

1. Describe the fundamental concepts of the cybersecurity discipline used to provide system security.

2. Describe potential system attacks and the actors that might perform them.

3. Describe cyber defense tools, methods and components and apply cyber defense methods to prepare a system to repel attacks.

4. Describe appropriate measures to be taken should a system compromise occur.

5. Properly use the vocabulary associated with cybersecurity.

Cybersecurity Foundations (CSP)

6. Define the principles of cybersecurity.

7. Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.

8. Analyze common security failures and identify specific design principles that have been violated.

9. Given a specific scenario, identify the design principles involved or needed.

10. Understand the interaction between security and system usability and the importance of minimizing the effects of security mechanisms.

IT Systems Components (ISC)

11. Describe the hardware components of modern computing environments and their individual functions.

12. Describe the basic security implications of modern computing environments.

13. Understand the Federal, State, and Local Cyber Defense partners/structures.

14. Properly use the vocabulary associated with cybersecurity (as in item 5).


ISCI 1117 Python for Cybersecurity

Upon completion of the course, students should be able to:

Basic Scripting and Programming (BSP)

1. Demonstrate their proficiency in the use of scripting languages to write simple scripts (e.g. to automate system administration tasks).

2. Write simple linear and looping scripts.

3. Write simple and compound conditions within a programming language or similar environment.

4. Demonstrate proficiency in the use of a programming language to solve complex problems in a secure and robust manner.

Other programming objective

5. Apply proper software design techniques when developing functions in a programming language to solve problems.

Cyber Crime (CCR)

6. Examine how the internet is used for cybercrime, cyber-stalking, and other abusive behaviors.

7. Evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse.

Cybersecurity Ethics (CSE)

8. Explain how ethical foundations are applied to situations arising from the interconnected world.

9. Examine diverse ethical dilemmas.

10. Describe the role of cybersecurity in supporting and encouraging ethics, as well as where cybersecurity practices can cause ethical conflicts.

Policy, Legal, Ethics, and Compliance (PLE)

11. List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.

12. Describe their responsibilities related to the handling of data as it pertains to legal, ethical, and/or agency auditing issues.

13. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.


ISCI 1120 Network+ Prep

At the end of this course, students will be able to:

Basic Networking (BNW)

1. Describe the fundamental concepts, technologies, components and issues related to communication and data networks.

2. Design a basic network architecture given a specific need and set of hosts/clients.

3. Track and identify the packets involved in a simple TPC connection (or a trace of such a connection).

4. Use network monitoring tools to observe the flow of packets (e.g. WireShark).

5. Perform network mapping (enumeration and identification of network components) (e.g. Nmap).

6. Describe common network vulnerabilities.

Network Defense (NDF)

7. Describe the key concepts in network defense (defense in depth, minimizing exposure, etc.)

8. Explain how network defense tools (firewalls, IDS, etc.) are used to defend against attacks and mitigate vulnerabilities.

9. Analyze how security policies are implemented on systems to protect a network.

10. Evaluate how network operational procedures relate to network security

Additionally

11. Gain the knowledge to complete the course assessment with a passing grade and/or the actual Network+ examination


ISCI 2130 Security+ Prep

At the end of this course, students will be able to:

1. Explain and define with clarity the terms of Internet Security principles and methodologies utilized in the industry

2. Explain and define with clarity the methods of protecting networks from common intrusion practices

3. Utilize common tools and processes to analyze various methods of attack upon a network

4. Gain the knowledge to complete the course assessment with a passing grade and/or the actual Security+ (SY0-501) examination

Basic Cryptography (BCY)

5. Identify the elements of a cryptographic system

6. Describe the differences between symmetric and asymmetric algorithms.

7. Describe which cryptographic protocols, tools and techniques are appropriate for a given situation.

8. Describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g. key management), etc.

Operating System Concepts (OSC)

9. Describe the role and basic functions of an operating system, and how operating systems interact with hardware and software applications.

10. Identify and describe basic security issues of operating systems.