New Course: UNI 350 – The Threat Within

Hot off the Press – New Course

The Threat Within

Prerequisite: Sophomore, junior, or senior standing.

Level: Undergraduate
College or School: University (General)
Department or Program: Interdisciplinary Studies
Class Number: 19417
Grading: A-E
Course Info: UUNI 350 Selected Interdiscip Topics
Meeting Info: – ARR Salavitabar,Hadi
Comments: Blended/Hybrid – Asynchronous: Online course activity replaces from 30 – 79% of required face-to-face class sessions and class “seat-time” is reduced commensurately. Asynchronous: describes forms of education, instruction, and learning that do not occur in the same place or same time. Open to Sophomores, Juniors, and Seniors.
Credit Range: 3.0- 3.0
Component is blank if lecture:
Topic if applicable: The Threat Within
Seats remaining as of last update: 50

 

Course Description: The Threat Within – A new operating reality is confronting public and private sector organizations and institutions of all shapes and sizes everywhere: the threat from within that is able to exploit and expose an organization’s greatest competitive edge – the “secret sauce.” Initially many experts thought of the insider threat challenge as a technical problem to solve.  However, if there is anything that one of the largest and most damaging data breaches in U.S. Government history – Edward Snowden – has taught us, it is that this challenge is simply not one dimensional. Insider threats can surface at the strategic, operational and tactical layers of an organization, and therefore, the solution needs to be comprehensive, logical, and balanced.

In this course, students from a variety of disciplines will work in teams of about six to eight students with course faculty, team faculty liaisons, and industry experts as mentors using an online/cloud communication platform. The goal of the course is to enable students to analyze realistic case scenarios and identify the depth and breadth of the cybersecurity challenge from multiple perspectives. Students will focus on the interrelated dimensions of the threat (which may include but are not limited to technical, procedural, legal, behavioral, skills/proficiencies) and the spectrum of constituent cyber domains/functional areas in which to identify solutions.

Course contact hours: Arranged. Most of the teaching will be online but some meetings will take place in person. Meeting hours will be arranged based on availability of team members who register for the course.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s