Tips for CYB/110
Question:
What are some tips for students starting CYB/110?
Answer:
CYB/110 (Foundations of Security)
Below you will see some useful resources to help you prepare for and complete your class successfully. Course Textbook
EC Council Certified Secure Computer User (CSCU)This course will assist you in preparing to take the EC Council Certified Secure Computer User (CSCU) exam. Completing Signature AssignmentsThere are signature assignments in Wks 1, 3, and 5 that require you to use the knowledge and skills you have learned in prior courses in addition to applying the knowledge and skills you are learning in this course. Your faculty member will use the rubric to grade your assignment. Read the assignment instructions and then review the grading rubric. The assignment instructions describe what you must do to complete the assignment. The rubric describes the performance levels. Ask your faculty member any questions you may have about the assignment instructions or the rubrics. Learn - Practice - ApplyCollege of Business and Information Technology courses follow the Learn-Practice-Apply model. Learn: Assignments labeled as “Learn” are intended to provide information that helps facilitate learning. These are learning activities and not for credit in the gradebook. Practice: The “Practice” assignments are intended to help you review and test your knowledge each week using a low-stakes assessment. In this course, all Practice assignments are lab activities through Practice Labs. These are worth fewer points and you may often receive credit simply for completing the assignment. Apply: The “Apply” assignments are higher stakes, worth more points, and have been made to demonstrate understanding of the information from the week. Note: In order to help you best prepare for success on “Apply” assignments, the “Practice” assignments are due earlier in the week. Practice with Practice LabsThroughout the course you will be using Practice Labs for hands-on experience.
Main ConceptsThroughout the next five weeks we will study data security fundamentals, threats and defenses of systems, threats and defenses of mobile devices, and data backup and disaster recovery. This Course in Relationship to the ProgramThis course is at the start of your program. It provides the foundational concepts that will lead you to a deeper understanding in future courses. Career ConnectionsIt is important to have a basic understanding of data security, threats and risks of online interactions, and data recovery when pursuing a career in cybersecurity. Resources
Check Your Work for Plagiarism - SafeAssign InstructionsYour assignment submissions will automatically be checked for plagiarism by SafeAssign, a feature in Blackboard. SafeAssign compares your submission to a database of student work and the internet and then generates an Originality Report that you and your instructor can review. Review the full SafeAssign instructions to learn more about this feature. Copyright 2020 by University of Phoenix. All rights reserved.
Additional Information:
We welcome and appreciate your feedback!
|