CSC 318 Applications for Cybersecurity
This course is designed to provide the necessary skills required to understand the key information security threats within an organization. These threats are becoming more sophisticated and therefore extremely hard to defend against without the proper protections in place. To effectively deter these threats an overall Cybersecurity process must encompass the development of security procedures and processes throughout the entire enterprise. This includes developing both defensive and offensive strategies. This course provides an in-depth look at techniques used to protect an enterprise against cybersecurity breaches. This includes understanding current frameworks including both the NIST Cybersecurity Framework & the Cyber Kill-Chain model. Additionally, tactical teams will be created leveraging offensive (red-team) and defensive (blue-team) tools to identify security weaknesses and protection mechanisms using a lab environment. This course is intended to be “hands-on”, therefore we will be implementing several projects throughout the semester using a variety of commercial and open-source tools. Some Python programming may be involved to migrate data between various tools.
Credits
3