This course provides a comprehensive review of industry approaches, practices and standards on how to handle risks to organizations' business-critical assets. Topics include identifying and analyzing threats, qualitative versus quantitative risk management, standards and processes to mitigate risk, risk control and risk policy. Through a practical approach, this course explores key topics that enable students to uncover and remediate potential infractions.
This course provides a comprehensive overview of disaster recovery and countermeasures for networks and businesses. Assess risks in the enterprise, determine critical business components, develop an enterprise disaster recovery system, and develop disaster policies, procedures, departmental roles and communication processes for enterprise network. It will provide a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. Learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Produce a disaster recovery document of procedures and policies to implement training, testing and rehearsal of a disaster recovery.
Human Decision and Security Engineering
Providing an exploration of the human aspects of Cybersecurity, this course will educate students on human motivation and interaction, how security controls may be bypassed by a person's intentional or unintentional acts, and methods for reducing the cyber risks associated with people. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets.
Security Trends and Legal Issues
This course examines the legal environment pertinent to security professionals. Topics include the role of government, relevant civil and criminal law, constitutional rights and privacy issues, intellectual property, and compliance. In addition, current trends in cybersecurity are explored.
This course explores the ways in which cryptography can be used to protect communications traffic and sensitive data. Course topics include symmetric vs. asymmetric (public-key) ciphers; hash algorithms; message authentication codes; mathematical underpinnings of cryptography; cryptanalysis; public-key infrastructure; and implementation trade offs. Students gain hands-on experience in state-of-the-art technologies through completion of weekly lab exercises. The primary focus of the course is on building critical-thinking and problem-solving skills.
This course explores the methods and tools utilized for collecting and preserving electronic digital evidence for the computer forensic process. Topics include the forensic examination, crime categories, analysis, laws governing forensics and report writing. Experience with forensics tools and techniques are provided.