|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
This course focuses on the issues surrounding cloud forensics, cloud deployment and service models, cloud infrastructure, and key considerations in migrating to cloud computing. Using the U.S. National Institute of Standards and Technology as a guide, the course addresses the technologies required to build and support classic (traditional), virtualized, and cloud data center environments. Course activities provide opportunities to explore the key considerations and steps involved in transitioning from the current model of physical data centers to the emerging cloud-computing environment. The hands-on focus of this class addresses the skills and processes involved in performing forensic investigation and analysis, migrating to a cloud-based infrastructure, and choosing the best deployment model for an organization.
-
3.00 Credits
This course explores information on cyber-storage infrastructure, including virtual environments, from a digital forensics and network penetration perspective. Additional topics include the architectures, features, and benefits of Intelligent Storage Systems, such as FC-SAN, IP-SAN, NAS, object-based, and unified storage.
-
3.00 Credits
This course is designed to appeal to a wide variety of backgrounds ranging from students without any coding experience all the way up to skilled Python developers looking to increase their expertise and map their capabilities to penetration testing. This course includes several hands-on labs designed to teach students the skills required to develop Python programs and how to apply those skills in penetration testing engagements. Topics include introduction to Linux scripting, Windows scripting, basic concept of Python and progress to advanced topics and their applications. Prerequisite(s): CFI 1085 with a grade of C or higher OR instructor consent.
-
3.00 Credits
This course provides an introduction to as well as hands-on experience in data visualization. Course topics include design principles for creating meaningful displays of quantitative and qualitative data to facilitate managerial decision-making and step-by-step guidance through complex searches to produce multiple types of graphs and customized visualizations. Course activities provide opportunities to create reports as well as complex dashboards, forms, and visualizations. Course materials include both open-source and commercial technology tools like Tableau. Prerequisite(s): CFI 1071 with a grade of C or higher or instructor consent
-
3.00 Credits
This course offers an overview of the legal processes involved in information security and privacy. The course begins with an exploration of common concepts in information security, privacy, and the law and then expands into a review several federal and state laws and legal concepts that affect how governments and organizations address issues of information security. The conclusion of the course addresses how to create an information security program that includes information governance, risk management, and contingency planning, as well as the essentials of investigating security incidents.
-
3.00 Credits
This course provides an in-depth study of commonly used forensic tools in corporate and law enforcement environments. This course also reviews and solidifies important concepts in forensic methodology and artifacts. Prerequisite(s): CFI 1081 with a grade of C or higher OR instructor consent
-
3.00 Credits
This course covers the three major phases of penetration testing (reconnaissance, vulnerability analysis, and exploitation) in detail. Course activities provide opportunities to discuss and demonstrate how to prepare a final report tailored to maximize the value of the penetration test from both a management and technical perspective. Course activities include a comprehensive hands-on exercise, conducting a stepwise penetration test against a hypothetical target organization. Course topics also include the limitations of penetration testing techniques and other practices that can augment penetration testing to find vulnerabilities in architecture, policies, and processes. Prerequisite(s): CFI 1083 with a grade of C or higher or instructor consent
-
3.00 Credits
This course builds on the topics covered in Introduction to Ethical Hacking, but focuses on web applications. The major phases of penetration testing (reconnaissance, vulnerability analysis and exploitation) remain the same, however, the tools and techniques for web applications vary greatly. The course will cover how to identify and exploit common web application flaws such as cross-site scripting, SQL injection, authentication flaws and more through hands-on labs. Course activities include a comprehensive hands-on exercise, conducting a penetration test against a unique lab web application. Prerequisite(s): CFI 1085 and CFI 2086 with grades of C or higher OR instructor consent.
-
3.00 Credits
This course focuses on deploying security and Intrusion Detection Systems (IDS), logs collections, handling, analytics, and analysis. Our analytical tools will comprise open-source Security Onions, Zeeks, SELKS, and LAMP (Linux, Apache, MySQL, PHP) stacks with a focus on security and Intrusion Detection Systems (IDS). Topics include the installation, configuration, and management of Security Onions, SELKS and LAMP resources, Snort IDS, Zeek IDS, and other threat analytical software IDS-related tools as well as the practical test firing of IDS resources and packets. Prerequisite(s): CFI 1085 with a grade of C or higher OR instructor consent.
-
3.00 Credits
This course presents the key tools and techniques malware analysts use to examine malicious programs by exploring Windows malware in two phases. Behavioral analysis focuses on the program's interactions with its environment, such as the registry, the network, and the file system. Code analysis focuses on the specimen's code and makes use of disassembler and debugger tools such as IDA Pro and OllyDbg. This course covers how to patch malicious executables to change their functionality during the analysis without recompiling them and redirect network traffic in the lab to better interact with malware. Prerequisite(s): CFI 1065 and CFI 1205 with grades of C or higher or instructor consent.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|