IT&C 366

Download as PDF

Defensive Cybersecurity

Electrical and Computer Engineering Ira A. Fulton College of Engineering

Course Description

Defensive security with the knowledge and tools to safeguard critical information. Security best practices, risk management, incident response, and critical defensive technology.

When Taught

Winter

Min

3

Fixed

3

Fixed

2

Fixed

3

Title

Incident Response

Learning Outcome

Explain the incident response process to effectively identify, mitigate, and recover from security incidents.

Title

Governance Policies

Learning Outcome

Analyze how security policies are implemented on systems to protect a network with an awareness of laws, regulatory standards, and best practices.

Title

Security Plan

Learning Outcome

Use risk assessment methods to create a security plan that addresses both technical and non-technical countermeasures for a management audience.

Title

Risk Management

Learning Outcome

Describe how risk relates to a system security policy and evaluate and categorize risk with respect to technology, people, and processes.

Title

Secure Network Environments

Learning Outcome

Configure and maintain secure network environments, including encryption, firewalls, intrusion detection systems, and virtual private networks (VPNs).

Title

Organizational Implications

Learning Outcome

Explain the benefits, limitations, and usability impact that network environments have an organization.

Title

Network Cyber Defense

Learning Outcome

Describe cyber defense tools, methods, and components, and apply cyber defense methods to prepare a network system to repel attacks.