Vulnerabilities and Exploits
Overview
- Cybersecurity threats and attack vectors
- Existing cybersecurity security protocols
- Security Posture Analysis
- Vulnerability Assessment
- Cybersecurity controls
- Cybersecurity attacks detection
- Cybersecurity attacks prevention
- Tools and systems that are used to strengthen and improve cybersecurity
- Cybersecurity policy development
The methods of instruction for this course will include lectures, seminars, demonstrations, and hands-on assignments/projects.
Assesment will be in accordance with the ÁñÁ«ÊÓƵ Evaluation Policy.
Assignments and labs |
15% - 20% |
Quizzes |
15% - 20% |
Midterm exam * |
25% - 30% |
Final Exam * |
25% - 30% |
Total |
100% |
* Practical hands-on computer exam
In order to pass the course, students must, in addition to receiving an overall course grade of 50%, also achieve a grade of at least 50% on the combined weighted examination components (including quizzes, tests, exams).
Students may conduct research as part of their coursework in this class. Instructors for the course are responsible for ensuring that student research projects comply with College policies on ethical conduct for research involving humans, which can require obtaining Informed Consent from participants and getting the approval of the ÁñÁ«ÊÓƵ Research Ethics Board prior to conducting the research.
At the end of this course, the successful student will be able to:
- Identify the current vulnerabilities and threats in the cyberworld.
- Demonstrate the knowledge on the current exploits and their impact to confidentiality, integrity, and availability of data.
- Conduct a security posture analysis that includes a vulnerability assessment of current systems or organizations.
- Apply the risk management framework in securing computer systems.
- Use latest techniques and tools in securing computer systems.
- Design policies and standard operating procedures that will help prevent and/or mitigate vulnerabilities and exploits to the computer systems.
- Analyze ways to safely return to a normal state after an exploit.
- Define accountability and responsibility to protect the computer system.
The course will utilize various resources that discuss cybersecurity vulnerabilities such as the Open Web Application Security Project (OWASP), Information Security Management Controls, Certified Ethical Hacking and other relevant sources. Materials may also include instructor provided notes and resources and/or any textbook approved by the department.
Requisites
Course Guidelines
Course Guidelines for previous years are viewable by selecting the version desired. If you took this course and do not see a listing for the starting semester / year of the course, consider the previous version as the applicable version.
Course Transfers
These are for current course guidelines only. For a full list of archived courses please see
Institution | Transfer Details for CSIS 4480 |
---|---|
Alexander College (ALEX) | ALEX CPSC 2XX (3) |
Athabasca University (AU) | AU COMP 3XX (3) |
College of New Caledonia (CNC) | CNC CSC 2XX (3) |
Coquitlam College (COQU) | No credit |
Kwantlen Polytechnic University (KPU) | No credit |
Thompson Rivers University (TRU) | TRU COMP 3XXX (3) |
University Canada West (UCW) | UCW CPSC 3XX (3) |
University of Northern BC (UNBC) | UNBC CPSC 3XX (3) |
University of the Fraser Valley (UFV) | UFV COMP 4XX (3) |
Course Offerings
Winter 2025
CRN | Days | Instructor | Status | More details |
---|---|---|---|---|
CRN
16978
|
Fri | Instructor Last Name
Vitus
Instructor First Name
Gabriel
|
Course Status
Open
|