Course Syllabus

Temple University

College of Liberal Arts / CYHB 2001

Introduction to Cybersecurity- 3 Credit Hours

 

Instructor: Dr. Julien Ehrenkönig
Email: ehrenkonig@temple.edu
Office Hours: Wednesdays 10:00AM-12:00PM & 2:00PM-4:00PM, or by appointment.
Office Location: Gladfelter Hall, 10th Floor, Room 1019

Download Syllabus PDF

 

Course Meeting Times: Tuesdays/Thursdays, 11:00AM – 12:20PM

Course Prerequisite: None. You do not have to have knowledge about the technical aspects of computers or computer crime to succeed in this class.

Course Overview:

Cybersecurity is a critically important component in nearly every industry today, driven by an ever-expanding and evolving cyberthreat landscape. Experts expect global cybercrime costs to increase by 15% annually over the next five years, reaching $10.5 trillion USD annually by 2025—up from $3 trillion USD in 2015. To reduce risk and improve security, organizations across all sectors are intensifying their efforts to mitigate risks and strengthen security by hiring skilled cybersecurity professionals. This course provides students with a foundational understanding of cybersecurity from an interdisciplinary perspective. It explores technical concepts while delving into the human behaviors and psychological factors that shape cyber risks and security measures. Students will gain insights into both the technological and human dimensions of cybersecurity and will be introduced to career pathway tools to begin their journey in this high-demand field.

Learning Objectives:

This course integrates technical and humanities perspectives to provide a comprehensive understanding of cybersecurity. Students will:

  • Analyze cybersecurity through an interdisciplinary lens, incorporating theories from technology and the social sciences to understand the interactions between human behavior, cultural beliefs, and technological systems.
  • Explore how societal factors, such as political, social, and economic dynamics, shape cybersecurity practices and influence the broader implications of digital security efforts.
  • Examine historical and contemporary examples of human behavior to understand how cultural assumptions and decision-making processes impact cybersecurity landscapes and contribute to the evolution of cyberthreats.
  • Investigate the evolution of cybersecurity roles and skill sets, identifying the tasks and expertise required across different specializations, while considering the social and cultural context of these roles.
  • Develop practical skills for navigating the cybersecurity job market, including the use of career tools aligned with individual interests, skills, and training, and addressing challenges such as cybersecurity culture, mindsets, and imposter syndrome.
  • Evaluate the consequences of cybersecurity decisions within the dual contexts of technological imperatives and the social dynamics of organizational and cultural systems.

Further, this course is intended to improve students’ skills in:

  • Information literacy: Identify, access, and evaluate sources of information.
  • Critical Thinking: Think critically about the materials presented during the course.
  • Contextualized Learning: Understand historical and contemporary issues in context.
  • Interdisciplinary Thinking: Understanding and applying knowledge in and across academic disciplines.
  • Communication Skills: Communicate effectively orally and in writing.

Required Course Materials and Readings

All course materials and readings are available on Canvas and can be accessed in each week’s module. Each of the readings we cover can also be accessed directly through the library’s catalog. Assigned readings should be completed each week before class so that students can effectively participate in our weekly discussions.

There are two optional texts for this course, which are both available through Temple University’s Library:

  1. Tsado, K., & Osgood, R. (2022). Exploring careers in cybersecurity and digital forensics. Rowman & Littlefield.
  2. Miller, (2022). Cybersecurity Career Guide. Manning Publications.

Technology Specifications:  The minimum technology and equipment required for this course is access to a computer and the internet. If you find that you need technological resources, you can visit the following link to see Temple’s Information Technology Services available to you: https://its.temple.edu/tech-students All students are required to comply with Temple University’s Computer and Network Security Policies.

Limited resources are available for students who do not have the technology they need for class. Students with educational technology needs, including no computer or camera or insufficient Wifi-access, should submit a Student Technology Assistance Application located in TUPortal and linked from the Dean of Students Support and Resources webpage. The university will endeavor to meet needs, such as with a long-term loan of a laptop or Wifi device, a refurbished computer, or subsidized internet access. The Affordable Connectivity Program is available to purchase discounted internet services and devices for qualified individuals.

On-campus computer labs are available for student use. Here is a list of computer labs available to students: https://its.temple.edu/computer-labs

Please note that there are technology resources available for students, including laptop share and battery share. Some software that is available for free download on the ITS Academic Support page. Other specialty software may be available for remote access through ITS.

 

Course Assessment and Grading: This course will consist of introductory lectures, weekly readings, media, in-class discussions, student presentations, and graded assignments. Your class grade will be based on the following:

  • Midterm Mini Media Ethnographic Project             25%
  • Final Presentation & Career Self-Portrait                35%
  • Written Reflection Assignments (x 4)                       20%
  • Attendance & Participation                                        20%

All assignments will be submitted via Canvas. In the event that a student has technical issues submitting their assignments online, please email your assignment to the instructor ( ehrenkonig@temple.edu ) so that the assignment is on time and the student receives credit. Canvas can be accessed at canvas.temple.edu. Please note that the only file types accepted are Microsoft Word (.doc, .docx, .txt), and Adobe (.pdf).

 

Midterm Mini Ethnographic Project 25%

For this midterm project, worth 25% of your grade, you will exercise your participant observation skills to explore the intersection of media practices and cybersecurity. Over the course of a week, you will record and analyze your own media use, focusing on how your habits and behaviors relate to key cybersecurity concepts such as privacy, data security, and digital vulnerabilities. You will submit your findings in a visual chart and a written report on Canvas, reflecting on how your media practices connect to the broader technical and human aspects of cybersecurity.

 

Final Presentation & Career Self-Portrait Reflection 35%

For your final, worth 35% of your grade, you will deliver a short presentation to the class that explores a key topic related to cybersecurity and human behavior, demonstrating your understanding of course concepts. Alongside this, you will submit a written career self-portrait, reflecting on how your knowledge of cybersecurity and its human dimensions aligns with your career goals. This reflection will connect your personal skills, career motivations, and insights gained throughout the course to the evolving challenges and opportunities in the field of cybersecurity.

 

Written Reflection Assignments (x 4) 20%

These four (4) written reflection assignments, worth 20% of your final grade, will ask you to critically engage with selected course readings or media by reflecting on the connections between the technical and human behavioral aspects of cybersecurity. You will analyze key concepts, explore how technical systems interact with human decision-making, and consider the broader implications for society. Your reflection should demonstrate thoughtful connections between the course materials and real-world cybersecurity challenges.

 

Weekly Attendance & Participation 20%

Attendance will be recorded at every class meeting. Regular attendance and active participation in group discussions are expected. You are allowed two unexcused absences without penalty. Any additional unexcused absences will result in a deduction from your attendance and participation grade. Students can have an absence excused if they provide proper documentation to the instructor (i.e. a doctor’s note, letter from coach, military service letter, etc.).  

Grading Scale

Letter Grade

A

A-

B+

B

B-

C+

C

C-

D+

D

D-

F

Percentage

93-

100

90-

92

87-

89

83-

86

80-

82

77-

79

73-

76

70-

72

67-

69

63-

66

60-

62

0-

59

 

Keep track of your own grades in the course (via Canvas) and seek help to improve grades as soon as possible.

 

Course Policies and Etiquette

Communication with Instructor: During the semester, I will generally respond to emails within 24 hours of receiving them during the week (Monday-Friday). Please keep in mind that emails received after 5:00PM during the week will not be seen or replied to until the following day. 

Late Work: Assignments are always due the day and time listed. All late work will be penalized one fraction of a letter grade for each day it is late; e.g., one day late moved what would be an A to an A-. I do not grant extensions except in emergency situations in order to be fair to all students. Notify me as soon as possible by email before the assignment is due if you will not be able to submit your assignment on time so that I can consider the circumstances and decide whether and extension is appropriate.

Class atmosphere: This is a course based on the discussion of ideas and the connection of those ideas to aspects of the world around us. In order to provide an environment conducive to the open sharing of ideas, I ask that you show respect for me and for your fellow classmates. You are asked to be tolerant of others’ opinions and show thoughtful consideration in your interactions.

Our differences, some of which are outlined in the University's nondiscrimination statement, will add richness to this learning experience. Working as a community of learners, we can build a polite and respectful course atmosphere.

Statement on recording and distribution of recordings of class sessions: In general, recording class lectures via audio or video devices is not permitted without permission from the instructor ahead of time. Any recordings that are permitted by the instructor can only be used for the student’s personal educational use. Students are not permitted to copy, publish, or redistribute audio or video recordings of any portion of the class session to individuals who are not students in the course or academic program without the express permission of the faculty member and of any students who are recorded. Distribution without permission may be a violation of educational privacy law, known as FERPA, as well as certain copyright laws.  Any recordings made by the instructor or university of this course are the property of Temple University.

Statement on the Use of Generative AI in This Course: Generative AI tools (e.g., ChatGPT, Bing Chat, Claude, Google Bard, etc.) may be used in limited ways and only with proper acknowledgment. To ensure fairness and maintain academic integrity, you may not submit AI-generated text for any classwork, assessments, or projects. This includes using AI to generate answers, complete assignments, or perform any graded course tasks.

You may use AI tools during the research or preparation phase of your work—for example, to brainstorm ideas—but all submitted work must be written by you. AI may also be used as a writing aid (e.g., grammar or clarity suggestions), but it must not replace your original thought, voice, or writing. Keep in mind that while AI tools can be helpful, they are not always accurate or reliable. It's important to critically evaluate any information or suggestions they provide. Misuse of AI in this course will be considered a violation of Temple University’s Academic Honesty policy and Student Conduct Code. If you're unsure whether a specific use of AI is acceptable, please ask for clarification.

Writing Center: If you think that you may need extra help developing your writing this semester, you should contact the Writing Center, located in the Tuttleman Learning Center, Suite 201. For more on the Writing Center, visit www.temple.edu/writingctr/.

 

University Policies

Academic Honesty Standards: Plagiarism will not be tolerated. Each student is required and expected to complete their own and independent work. Plagiarism consists of presenting the material of others as your own. This is a serious offence. Plagiarism, as defined by the Oxford English Dictionary, is “the wrongful appropriation or purloining, and publication as one’s own, of the ideas, or the expression of the ideas (literary, artistic, musical, mechanical) of another.” The instructor will demonstrate the proper ways to cite sources for assignments in order

to prevent the misuse of these materials. Proper citation for the writing assignments will prevent plagiarism. If the instructor discovers plagiarism on a student’s work, that assignment will receive a 0%. If further incidence of plagiarism is detected, the student will receive an F as their final grade for this course. Temple University believes strongly in academic honesty and integrity. Please follow this link to see Temple University’s Policy on Academic Honesty: http://www.temple.edu/bulletin/Responsibilities_rights/responsibilities/responsibi lities.shtm.

 

Services for Students with Disabilities: Any student who has a need for accommodation based on the impact of a documented disability, including special accommodations for access to technology resources and electronic instructional materials required for the course, should contact me privately to discuss the specific situation by the end of the second week of classes or as soon as practical. If you have not done so already, please contact Disability Resources and Services (DRS) at 215-204-1280 in 100 Ritter Annex to learn more about the resources available to you. I will work with DRS to coordinate reasonable accommodations for all students with documented disabilities.

 

Online Learning Resources: Students can access any of the course materials directly through Canvas. Additionally, the course reading materials can be found in Temple University’s library. If you have issues locating a specific reading, please contact the instructor or a library staff member: https://library.temple.edu/. Temple students also have access to the Student Success Center which provides many different academic support services such as tutoring, a writing center, and academic coaching. To see a full list of services available to students, please visit the following website: https://studentsuccess.temple.edu/

 

Student and Faculty Academic Rights and Responsibilities: Freedom to teach and freedom to learn are inseparable facets of academic freedom. The University has a policy on Student and Faculty and Academic Rights and Responsibilities (Policy #03.70.02) which can be accessed through the following link: http://policies.temple.edu/getdoc.asp ?policy _no=03. 70. 02.

 

Temple Learning Management System: The university uses Canvas as it’s learning management system. This course will use this platform. For information on how to use or navigate Canvas, please visit the following link: https://its.temple.edu/canvas-quick-reference-guide-students

 

Temple University's Technology Usage Policy: Temple’s policy on access to technological resources on campus can be found at the following link: https://computerservices.temple.edu/technology-usage-policy