0 or 3 credits
Fall 2025 Lecture Laboratory Upper DivisionThis course will bridge business operations to IT support of the critical systems that support day-to-day operations. Techniques to detect anomalous behaviors through the configuration and monitoring of modern Intrusion Detection systems, analyzing and decoding network flows, system logs, and reports is covered along with appropriate remediation actions. Multiple approaches, theories, standards, and suggestions for incident response handling will be examined.
Learning Outcomes1Assess vulnerabilities, threats, and risk to business computing assets, and align response strategies with business requirements.
2Design, assess, and apply enterprise-level incident response plans.
3Analyze information systems to detect common attack techniques, malicious applications, network activities, and anomalies; apply results of causal analysis to implement continuous process improvement.
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available
No grades available