CollegeTransfer.Net
Toggle menu
Home
Search
Search
Search Transfer Schools
Search for Course Equivalencies
Search for Exam Equivalencies
Search for Transfer Articulation Agreements
Search for Programs
Search for Courses
PA Bureau of CTE SOAR Programs
Transfer Student Center
Transfer Student Center
Adult Learners
Community College Students
High School Students
Traditional University Students
International Students
Military Learners and Veterans
About
About
Institutional information
Transfer FAQ
Register
Login
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
CYB 450: Cloud Computing
3.00 Credits
Thomas Edison State University
Cloud Computing examines frameworks and techniques used to design, develop, and implement cloud-computing systems. Emphasis is on applied and project-based learning approach to set up Windows-based clouds using client portals, servers, virtual machines, and the accompanying network infrastructure.
Share
CYB 450 - Cloud Computing
Favorite
CYB 451: Cloud Security and Privacy
3.00 Credits
Thomas Edison State University
Cloud Security and Privacy provides an in-depth study of the security and privacy of cloud computing systems. Topics include cloud-computing models, security risks associated with data and computation outsourcing, threat model, and cloud-based security controls and measures. The course also addresses the development of an audit to ensure operational integrity and protection of customer data in cloud-based resources and examines internet of things (IoT) in the context of cloud security and privacy.
Share
CYB 451 - Cloud Security and Privacy
Favorite
CYB 495: Cybersecurity Capstone
3.00 Credits
Thomas Edison State University
Cybersecurity Capstone is a project-driven study with an emphasis on integration and application of cybersecurity knowledge and skills gained throughout the program. The aim is to examine the architecture of a complex system, identify significant vulnerabilities and threats, and apply appropriate security technologies and methods to ensure the overall security of the system. Advanced cybersecurity principles and best practices are applied to develop a comprehensive cyberdefense program for an enterprise against cyber threats.
Share
CYB 495 - Cybersecurity Capstone
Favorite
CYB 510: Cybersecurity Foundations
3.00 Credits
Thomas Edison State University
Cybersecurity Foundations covers fundamental concepts of the interdisciplinary field of cybersecurity by taking into consideration both technical and management aspects. Students analyze cyber threats and vulnerabilities and examine common cyber defense technologies, processes, and procedures. Students are exposed to how cybersecurity can be enforced, in networks, operating systems, and software development lifecycle (SDLC). The course also introduces students to the human, legal, privacy, and ethical aspects of cybersecurity. The goal is to prepare students for advanced study in cybersecurity.
Share
CYB 510 - Cybersecurity Foundations
Favorite
CYB 520: Network Defense and Security
3.00 Credits
Thomas Edison State University
Network Defense and Security offers in-depth coverage of secure network design concepts, intrusion detection and prevention systems, network monitoring and mapping tools, web filtering, packet filtering, and advanced malware protection. Proactive methodologies for assessing and analyzing both host-based and network-based vulnerabilities are examined. Appropriate network defense measures and technologies are identified and evaluated. The course also examines the nomenclature of mobile and wireless networks and security of mobile systems and devices.
Share
CYB 520 - Network Defense and Security
Favorite
CYB 521: Foundations of Utility Cybersecurity
3.00 Credits
Thomas Edison State University
This course introduces foundational cybersecurity concepts applied to utilities as part of critical infrastructure. Topics covered include: fundamental security concepts and nomenclature; types of utility networks and systems including information technology (IT) and operational technology (OT), such as industrial control systems (ICS) and supervisory control and data acquisition (SCADA); risk management concepts; the pairing of threats to defensive countermeasures; introduction to applicable standards and control frameworks; and presenting cybersecurity plans to decision makers. This course lays the foundation for the graduate certificate. It is recommended that this course be taken first.
Share
CYB 521 - Foundations of Utility Cybersecurity
Favorite
CYB 522: Cybersecurity Risk Mngt in Utility Envir
3.00 Credits
Thomas Edison State University
In this course, students will learn how to identify applicable cybersecurity risk mitigation models and apply them in an organizational context. They will develop the knowledge and skills needed to make recommendations related to the choice of risk mitigation security controls and to provide oversight for the implementation of those controls within information technology (IT) and operational technology (OT) systems. This course will give students the tools to develop risk models that reflect the organization's unique governance structure and corporate culture. Using risk analyses that are predicated upon a holistic risk picture (business, environment, compliance, etc.) of the organization, students will learn how to articulate and defend risk allocation recommendations to accept, transfer, mitigate, or ignore risk, and to communicate cybersecurity risks to peers and senior management in both IT and OT. This course will also expose students to relevant international utility-related cybersecurity regulations, standards, and guidelines.
Share
CYB 522 - Cybersecurity Risk Mngt in Utility Envir
Favorite
CYB 523: Protective Scrty Ctrls Utility Syst/Ntwk
3.00 Credits
Thomas Edison State University
In this course students will learn how to identify, develop, and apply security controls in utility information technology (IT) and operational technology (OT) environments with a focus on protective security controls. These controls are implemented to mitigate inherent risks and reduce the chances of utility systems being compromised. Such controls include identity and access management, awareness and training, asset management, secure network architecture and segmentation, secure coding practices, personnel security, and physical security. Students will use risk-based frameworks, regulations, standards, best practices, and security control catalogs to identify and select applicable protective controls in utility environments.
Share
CYB 523 - Protective Scrty Ctrls Utility Syst/Ntwk
Favorite
CYB 524: Mntrng/Detect/Rspns/Rcvry Utility Envrn
3.00 Credits
Thomas Edison State University
The students will learn methods and techniques for monitoring information technology (IT) and operational technology (OT) environments. Along with developing an expertise in system monitoring techniques, students will learn methods for detecting compromise and develop strategies for effectively responding to and recovering from compromise. Students will learn methods and techniques such as network baselining, perimeter and internal monitoring and defense, situational awareness, intrusion detection, detecting exploits, ""kill chain"" management, event analysis and correlation, incident response, evidence collection and preservation, and system recovery and restoration.
Share
CYB 524 - Mntrng/Detect/Rspns/Rcvry Utility Envrn
Favorite
CYB 525: Intgrtng Cybrscty System Lifecycle
3.00 Credits
Thomas Edison State University
This course focuses on integrating security into the entire system and solution life cycle. Topics include system planning, architecture, design, acquisition, development, implementation/operation, sustainment, and disposal. Students will learn the importance of ensuring that security practices are identified and integrated into utility networks and systems projects. In addition, this course will help students develop knowledge and skills needed for integrating security requirements into technology acquisitions and identifying and managing supply chain risks across life cycle. Using case studies, students will apply concepts learned throughout the program to solve real-world utility and network system security challenges.
Share
CYB 525 - Intgrtng Cybrscty System Lifecycle
Favorite
First
Previous
11
12
13
14
15
Next
Last
Results Per Page:
10
20
30
40
50
Search Again
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
College:
(Type the name of a College, University, Exam, or Corporation)
Course Subject:
(For example: Accounting, Psychology)
Course Prefix and Number:
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
Course Title:
(For example: Introduction To Accounting)
Course Description:
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
Within
5 miles
10 miles
25 miles
50 miles
100 miles
200 miles
of
Zip Code
Please enter a valid 5 or 9-digit Zip Code.
(For example: Find all institutions within 5 miles of the selected Zip Code)
State/Region:
Alabama
Alaska
American Samoa
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Federated States of Micronesia
Florida
Georgia
Guam
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Marshall Islands
Maryland
Massachusetts
Michigan
Minnesota
Minor Outlying Islands
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Northern Mariana Islands
Ohio
Oklahoma
Oregon
Palau
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virgin Islands
Virginia
Washington
West Virginia
Wisconsin
Wyoming
American Samoa
Guam
Northern Marianas Islands
Puerto Rico
Virgin Islands