IT&C 366
Download as PDF
Defensive Cybersecurity
Electrical and Computer Engineering
Ira A. Fulton College of Engineering
Course Description
Defensive security with the knowledge and tools to safeguard critical information. Security best practices, risk management, incident response, and critical defensive technology.
When Taught
Winter
Min
3
Fixed
3
Fixed
2
Fixed
3
Title
Incident Response
Learning Outcome
Explain the incident response process to effectively identify, mitigate, and recover from security incidents.
Title
Governance Policies
Learning Outcome
Analyze how security policies are implemented on systems to protect a network with an awareness of laws, regulatory standards, and best practices.
Title
Security Plan
Learning Outcome
Use risk assessment methods to create a security plan that addresses both technical and non-technical countermeasures for a management audience.
Title
Risk Management
Learning Outcome
Describe how risk relates to a system security policy and evaluate and categorize risk with respect to technology, people, and processes.
Title
Secure Network Environments
Learning Outcome
Configure and maintain secure network environments, including encryption, firewalls, intrusion detection systems, and virtual private networks (VPNs).
Title
Organizational Implications
Learning Outcome
Explain the benefits, limitations, and usability impact that network environments have an organization.
Title
Network Cyber Defense
Learning Outcome
Describe cyber defense tools, methods, and components, and apply cyber defense methods to prepare a network system to repel attacks.