Cyber intelligence is the collection and analysis of information about cyber adversaries’ (also known as hackers, cyber threat actors) motivations, capabilities, geopolitical aspirations and activities in the cyber and physical domains to support decision making about cyber security.  Students use analytical methodologies, risk assessment models, and cyber security frameworks to develop common vocabulary to support technical and managerial discussions about cyber threats. 

The goal of this course is to familiarize the student with the elements of automated production systems from both traditional and modern (cyber-physical) perspectives, reflecting the long (20-40 year) asset lifecycles commonly seen in large manufacturing plants in both discrete and process industries.

Module/Workshop
Cybersecurity Threats & Attacks New!

This module focuses on various types of cyber attacks. Students will be exposed to the forms, mechanisms, and characteristics of some of the most frequently seen online threats. The module also discusses common techniques used by intruders who go after personal and business data that are private and confidential. This module can be used as a standalone unit.

5 Lessons

This second module, last half of the Ethics for the Cyber Age course, looks into practical issues that impact established ethical standards and befuddle today’s information workers and organizations. Issues such as data privacy, intellectual property, and social responsibility have long existed, whereas artificial intelligence and evolving professional codes of ethics are relatively new.

5 Lessons
Module/Workshop
Ethical Theories

This first module of the Ethics for the Cyber Age course focuses on classic ethical theories that provide moral guidelines to individuals who need assistance in approaching cyber concerns in a thoughtful manner. This module lays the knowledge foundation for students who don’t have much exposure in the subject matter. Instructors may use this module as a standalone learning unit.

5 Lessons