Cyber-based attacks and data breaches are a critical risk for organizations of any size. Effective defenses to the cyber threat are usually not well understood or applied. This course delivers a step-by-step methodology to secure any infrastructure, by enhancing defenses to the core components of networks, operating systems, and databases. The approach integrates cyber threat and risk management, defense-in-depth, network monitoring, cloud, and mobile devices. Also provides effective strategies for security testing, mitigating the insider threat, and recovering from a security incident. Current events case studies illustrate key concepts. Cyber defense techniques are demonstrated in computer and DIY device (Beaglebone) labs. Final project enables students to apply the methodology to secure an infrastructure of their choice. Course relevant for security and IT professionals, students, technical users, management, and anyone seeking an understanding of the key principles of cyber defense.
Course OutlineThis course delivers a step-by-step methodology to secure any infrastructure by enhancing defenses to the core components of networks and databases, integrating cyber threat/risk management, defense-in-depth, and more.
PrerequisitesX 420.1 Fundamentals of Information Systems Security
Applies Towards the Following Certificates
- Applications Programming : Electives
- Applications Programming in C# .NET : Electives
- Cybersecurity : Required
- Database Management : Electives
- Linux/Unix : Electives
- Operating System Administration : Electives
- Study Abroad at UCLA Program : Required
- Systems Analysis : Electives
- Web Technology : Electives