Network, Operating System, and Database Security
What you can learn.
- Identify motivations and tactics for the major categories of cyber threat actors
- Recognize common types of cyber attacks and exploits
- Demonstrate understanding of risk management as it applies to information security management
- Apply lessons learned from an APT case study
- Demonstrate a basic understanding of modern network protocols
- Identify the components of an enterprise network architecture
About this course:
Cyber-based attacks and data breaches are a critical risk for organizations of any size. Effective defenses to the cyber threat are usually not well understood or applied. This course delivers a step-by-step methodology to secure any infrastructure, by enhancing defenses to the core components of networks, operating systems, and databases. The approach integrates cyber threat and risk management, defense-in-depth, network monitoring, cloud, and mobile devices. Also provides effective strategies for security testing, mitigating the insider threat, and recovering from a security incident. Current events case studies illustrate key concepts. Cyber defense techniques are demonstrated in computer and DIY device (Beaglebone) labs. Final project enables students to apply the methodology to secure an infrastructure of their choice. Course relevant for security and IT professionals, students, technical users, management, and anyone seeking an understanding of the key principles of cyber defense.
It is advisable that you complete the following (or equivalent) since they are prerequisites for Network, Operating System, and Database Security.
Fall 2018 Schedule
These courses are fully online, and there are no in-person classroom meetings.
Enrollment limited. Enrollment deadline: October 2, 2018. Internet access required. Materials required.
These courses meet in person and make use of an online presence to varying degrees.
Enrollment limited. Enrollment deadline: October 3, 2018. Internet access required. Materials required.