Skip to Main Content

CSC 518 Applications for Cybersecurity

This course is designed to provide the necessary skills required to understand the key information security threats within an organization. These threats are becoming more sophisticated and therefore extremely hard to defend against without the proper protections in place. To effectively deter these threats an overall Cybersecurity process must encompass the development of security procedures and processes throughout the entire enterprise. This includes developing both defensive and offensive strategies. This course provides an in-depth look at techniques used to protest an enterprise against cybersecurity breaches. This includes understanding current frameworks including both the NIST Cybersecurity Framework & the Cyber Kill-Chain model. Prerequisite: CSC 202 or CSC 522.

Credits

3