Dec 15, 2025  
BC3 Academic Catalog: 2023-2024 
    
BC3 Academic Catalog: 2023-2024 [ARCHIVED CATALOG]

NPHS 105 - Introduction to Cyber Security

3 Credits: (3 lecture)

Course Description
This course introduces the dynamic information of security covering a broad range of areas including hacker and personal information protection along with up-to-the-minute developments in information security networks. Other areas of study include ethical, legal, and moral issues; industry and vendor-specific certifications; encryption and decryption, methods and protocols; and the security system design life cycle. 

Note Spring semester only.

Text
No text required.

Objectives
The student will be able to 

A. Define the parameters of cyber security and security terminology. 

B. List the critical characteristics of information. 

C. Describe legal, ethical, and moral issues relating to information security. 

D. Analyze the concepts and framework of information security policies. 

E. Identify organizations and associations of security professionals and certifications. 

F. Discuss the System Design Life Cycle (SDLC) and the Security System Design Life Cycle  (SSDLC). 

G. Discuss secure communication protocols and cryptography. 

H. Assess the difference between threats and risks.  

Content
A. Security terminology and information characteristics 

B. Cyber security and the legal system 

C. Cyber security ethics 

D. Security organizations, associations, and federal agencies 

E. Credentials and certifications in security 

F. System Design Life Cycle (SDLC) 

G. Security Systems Design Life Cycle (SSDLC) 

H. Cryptography 

I. Security protocols/Threats and risks 

Student Evaluation
Final grade will be based on assignments, quizzes, examinations, and a course security  project.

Bibliography
Amoroso, Edward. Cyber Security.  Summit, NJ: Silicon Press, 2006. Print.  

Graham, James, Ryan Olson, and Rick Howard. Cyber Security Essentials. Philadelphia: Auerbach, 2010. Print.  

Kramer, Franklin, Stuart H. Starr, and Larry Wentz. Cyberpower and National Security.  

Dulles, VA: Potomac Books, 2009.  Print.