Coursework
Intrusion Detection & Incident Response
Network Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Experiment and observe how network Layer 2 and Layer 3 protocols work on a network architecture with a set of hosts/clients. Track, identify, and display network packets while utilizing network monitoring and troubleshooting tools.
Cybersecurity Risk Management
Security Operations Center
Acquire the knowledge to utilize the tools and techniques to perform risk assessments of information systems. Understanding the methodologies and steps of different risk management frameworks from entities such as NIST and ISO.
Understanding the components of a SIEM, data flow in a SOC, log analysis, network traffic analysis, and email security. Hands-on experience with labs to perform threat hunting and incident response.
Applied Cryptography
Data Science for Security
The application of major cryptographic algorithms, mechanisms, services, and types of cryptographic methods. Develop an understanding of PKI management and policy.
Conceptual understanding of the application of data science in the context of information security. The utilization of data analysis techniques and tools to apply data analytics to cybersecurity problems.
Secure Enterprise Computing
Enterprise Applications Development
Understanding of the tools and techniques used in enterprise security operations and knowledge associated with the operational implementation of security in enterprise information systems.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Advanced Information Systems Development
Secure Software Design
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Database Administration and Implementation
Information Systems Infrastructure and Networks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.