Field of Study Home
Network & Infrastructure
Areas of Interest
Select the area you are interested in below to view related courses.
COM SCI X 417.29F
This course explores local, network, and application security and covers firewalling, scanning and fingerprinting, monitoring and detection, tunneling, spoofing, packet injection, and covert-channel steganography.
COM SCI X 417.29A
This course covers general networking, how to implement and access it from the Linux platform specifically, and Manual and automatic IP configurations. TCP/IP networking over Ethernet is the central focus.
COM SCI X 460.1
This course provides a hands-on introduction to the architecture, deployment, and management of Amazon Web Services (AWS).
COM SCI X 451.100
This is a hands-on course on Cisco Networking, helping students prepare for the Cisco Certified Entry Networking Technician (CCENT) and the Cisco Certified Networking Associate (CCNA) certification exams.
COM SCI X 451.101
The second course in Cisco Networking series. Helps students prepare for the Cisco Certified Entry Networking Technician (CCENT) and the Cisco Certified Networking Associate (CCNA) Routing and Switching certification exams
COM SCI 900.003
The UCLA Extension Cybersecurity Boot Camp is a challenging, part-time program that prepares students with the skills, understanding, and tools they will need to initiate and advance their careers in the cybersecurity industry.
COM SCI X 420.9
This hands-on course introduces defensive methodology and tools. Building on the remediation strategies for thwarting off active offensive attacks, and introducing core defensive strategies for various environment types.
Format: Online | Hybrid
COM SCI X 420.8
This course provides a hands-on application of common tools used during penetration assessments and of the specialized security tools available. Providing an opportunity to create a custom tool or extension to a known tool.
COM SCI X 420.7
The class will examine relevant policies and regulations along with auditing practices. Topics covered include auditing standards and ethics, privacy, intellectual property, and legal issues in cyberspace.
COM SCI X 420.2
This course provides an overview of Management, Operational, and Technical controls necessary to build a solid risk management framework for information security and privacy.
COM SCI 800.006
Hands-on workshops, meaningful discussions, and interactive problem-solving exercises build cybersecurity competencies and prepare senior business leaders to more effectively analyze risk and manage security issues within their organizations.
COM SCI 800.008
Tailored for CISOs and senior security leaders, this course includes hands-on workshops and exercises that teach the practical application of C-level management principles, while building competencies in relevant areas of knowledge, including risk and privacy, cyber insurance, cyberlaw, post-breach mediation, and crisis communication.
COM SCI 800.005
The course prepares participants to make better underwriting, claims and pricing decisions by accurately analyzing cyber risk coverage for various insurance policies. Senior insurance executives learn to effectively respond to cyber risk exposures from an enterprise risk management perspective.
COM SCI 800.007
This course offers unique, immersive learning experiences for in-house and outside counsel that focus on the intersection of law, business, policy, and technology in relation to the cyber world. Participants emerge as legal experts in cyber law, which is essential for the security and accountability for every type of legal practice.
COM SCI X 420.11
This course covers the foundation of different types of malware and rootkits, how hackers use different techniques to gain access to systems,and malware propagation techniques, method of infections, & how to detect rootkits.
COM SCI X 420.1
This course combines theoretical security models with practical examples for a comprehensive intro and should benefit auditors, system administrators, or anyone else with a basic understanding of information technology.
Format: Classroom | Online
COM SCI X 420.12
Learn the vulnerabilities of the cloud model, ways for companies to assess cloud risk and present methods and architectures that mitigate such risks & enhance the security, integrity, and availability of data in the cloud.
COM SCI X 420.3
This security course covers physical and logical security over data centers and offices. It defines a management program that protects assets across all levels of tech and core components that support that technology.
COM SCI X 417.31
This hands-on lab course covers a rich mix of Linux and Unix distributions and features and prepares students for separate specialized follow-on courses in Linux/Unix system administration, networking, and shell scripting.
COM SCI X 417.39A
This course offers a thorough technical understanding of Unix scripts and the shells that house and interpret them. Homework and hands-on lab exercises provide practical experience programming the Bourne Again shell (Bash).
COM SCI X 417.31A
This intermediate course covers local and network system administration within the Red Hat-derived family of Linux distributions, Fedora and CentOS, with emphasis on configuration files.
COM SCI X 417.08A
Learn how to deploy Windows 2012 Server, modify system and component settings, administer users and groups, monitor stability and performance, handle windows DNS, networking, and security tools in Windows 2012 Server.
COM SCI X 417.96
Learn network communications, from the basics of network topologies, OSI layering, & Ethernet to networking hardware and packet-switching fundamentals. The course focuses on TCP/IP and its plethora of protocols and services.
Format: Online | Classroom
COM SCI X 420.5
This course delivers a step-by-step methodology to secure any infrastructure by enhancing defenses to the core components of networks and databases, integrating cyber threat/risk management, defense-in-depth, and more.
Format: Online | Classroom
COM SCI X 418.694A
Intended for anyone working with Microsoft SQL server, this course covers basic syntax and statements used to create functioning Transact-SQL modules with an emphasis on reporting techniques and performance tuning.