This course delivers a step-by-step methodology for securing any infrastructure through enhanced defenses to the core components of networks and databases.
Identify motivations and tactics for the major categories of cyber threat actors
Recognize common types of cyber attacks and exploits
Demonstrate understanding of risk management as it applies to information security management
Apply lessons learned from an APT case study
Demonstrate a basic understanding of modern network protocols
Identify the components of an enterprise network architecture
About this course:
Cyber-based attacks and data breaches are threats to any organization, however, effective defense mechanisms are seldom well understood or applied. This course delivers a step-by-step methodology for securing any infrastructure through enhanced defenses to the core components of networks and databases; this approach integrates cyber threat and risk management, defense-in-depth, network monitoring, cloud, and mobile devices.
Designed for security and IT professionals, students, technical users, management, and anyone seeking an understanding of the key principles of cyber defense, this course also provides effective strategies for security testing, mitigating insider threats, and recovering from security incidents.
Current events case studies will illuminate key concepts, and cyber defense techniques will be demonstrated in computer and DIY device (BeagleBone) labs. The final project will enable students to apply the methodology to secure infrastructures of their choice.
We use cookies to understand how you use our site and to improve your experience, including personalizing content and to store your content preferences. By continuing to use our site, you accept our use of cookies.
Read our privacy policy.