Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    Cloud Computing examines frameworks and techniques used to design, develop, and implement cloud-computing systems. Emphasis is on applied and project-based learning approach to set up Windows-based clouds using client portals, servers, virtual machines, and the accompanying network infrastructure.
  • 3.00 Credits

    Cloud Security and Privacy provides an in-depth study of the security and privacy of cloud computing systems. Topics include cloud-computing models, security risks associated with data and computation outsourcing, threat model, and cloud-based security controls and measures. The course also addresses the development of an audit to ensure operational integrity and protection of customer data in cloud-based resources and examines internet of things (IoT) in the context of cloud security and privacy.
  • 3.00 Credits

    Cybersecurity Capstone is a project-driven study with an emphasis on integration and application of cybersecurity knowledge and skills gained throughout the program. The aim is to examine the architecture of a complex system, identify significant vulnerabilities and threats, and apply appropriate security technologies and methods to ensure the overall security of the system. Advanced cybersecurity principles and best practices are applied to develop a comprehensive cyberdefense program for an enterprise against cyber threats.
  • 3.00 Credits

    Cybersecurity Foundations covers fundamental concepts of the interdisciplinary field of cybersecurity by taking into consideration both technical and management aspects. Students analyze cyber threats and vulnerabilities and examine common cyber defense technologies, processes, and procedures. Students are exposed to how cybersecurity can be enforced, in networks, operating systems, and software development lifecycle (SDLC). The course also introduces students to the human, legal, privacy, and ethical aspects of cybersecurity. The goal is to prepare students for advanced study in cybersecurity.
  • 3.00 Credits

    Network Defense and Security offers in-depth coverage of secure network design concepts, intrusion detection and prevention systems, network monitoring and mapping tools, web filtering, packet filtering, and advanced malware protection. Proactive methodologies for assessing and analyzing both host-based and network-based vulnerabilities are examined. Appropriate network defense measures and technologies are identified and evaluated. The course also examines the nomenclature of mobile and wireless networks and security of mobile systems and devices.
  • 3.00 Credits

    This course introduces foundational cybersecurity concepts applied to utilities as part of critical infrastructure. Topics covered include: fundamental security concepts and nomenclature; types of utility networks and systems including information technology (IT) and operational technology (OT), such as industrial control systems (ICS) and supervisory control and data acquisition (SCADA); risk management concepts; the pairing of threats to defensive countermeasures; introduction to applicable standards and control frameworks; and presenting cybersecurity plans to decision makers. This course lays the foundation for the graduate certificate. It is recommended that this course be taken first.
  • 3.00 Credits

    In this course, students will learn how to identify applicable cybersecurity risk mitigation models and apply them in an organizational context. They will develop the knowledge and skills needed to make recommendations related to the choice of risk mitigation security controls and to provide oversight for the implementation of those controls within information technology (IT) and operational technology (OT) systems. This course will give students the tools to develop risk models that reflect the organization's unique governance structure and corporate culture. Using risk analyses that are predicated upon a holistic risk picture (business, environment, compliance, etc.) of the organization, students will learn how to articulate and defend risk allocation recommendations to accept, transfer, mitigate, or ignore risk, and to communicate cybersecurity risks to peers and senior management in both IT and OT. This course will also expose students to relevant international utility-related cybersecurity regulations, standards, and guidelines.
  • 3.00 Credits

    In this course students will learn how to identify, develop, and apply security controls in utility information technology (IT) and operational technology (OT) environments with a focus on protective security controls. These controls are implemented to mitigate inherent risks and reduce the chances of utility systems being compromised. Such controls include identity and access management, awareness and training, asset management, secure network architecture and segmentation, secure coding practices, personnel security, and physical security. Students will use risk-based frameworks, regulations, standards, best practices, and security control catalogs to identify and select applicable protective controls in utility environments.
  • 3.00 Credits

    The students will learn methods and techniques for monitoring information technology (IT) and operational technology (OT) environments. Along with developing an expertise in system monitoring techniques, students will learn methods for detecting compromise and develop strategies for effectively responding to and recovering from compromise. Students will learn methods and techniques such as network baselining, perimeter and internal monitoring and defense, situational awareness, intrusion detection, detecting exploits, ""kill chain"" management, event analysis and correlation, incident response, evidence collection and preservation, and system recovery and restoration.
  • 3.00 Credits

    This course focuses on integrating security into the entire system and solution life cycle. Topics include system planning, architecture, design, acquisition, development, implementation/operation, sustainment, and disposal. Students will learn the importance of ensuring that security practices are identified and integrated into utility networks and systems projects. In addition, this course will help students develop knowledge and skills needed for integrating security requirements into technology acquisitions and identifying and managing supply chain risks across life cycle. Using case studies, students will apply concepts learned throughout the program to solve real-world utility and network system security challenges.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.