Coursework

Intrusion Detection & Incident Response

Network Security

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Experiment and observe how network Layer 2 and Layer 3 protocols work on a network architecture with a set of hosts/clients. Track, identify, and display network packets while utilizing network monitoring and troubleshooting tools.

Cybersecurity Risk Management

Security Operations Center

Acquire the knowledge to utilize the tools and techniques to perform risk assessments of information systems. Understanding the methodologies and steps of different risk management frameworks from entities such as NIST and ISO.

Understanding the components of a SIEM, data flow in a SOC, log analysis, network traffic analysis, and email security. Hands-on experience with labs to perform threat hunting and incident response.

Applied Cryptography

Data Science for Security

The application of major cryptographic algorithms, mechanisms, services, and types of cryptographic methods.  Develop an understanding of PKI management and policy.

Conceptual understanding of the application of data science in the context of information security. The utilization of data analysis techniques and tools to apply data analytics to cybersecurity problems.

Secure Enterprise Computing

Enterprise Applications Development

Understanding of the tools and techniques used in enterprise security operations and knowledge associated with the operational implementation of security in enterprise information systems.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Advanced Information Systems Development

Secure Software Design

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Database Administration and Implementation

Information Systems Infrastructure and Networks

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.