Recent Posts
Recent Comments
Archives
Categories
Welcome

Specialized Masters Classes

(Legend * = Completed and In Progress)

IT Governance*
In this course students learn how IT organizations are managed in a controlled environment. Students learn how to create a control environment assure alignment to corporate strategy, portfolio management, organizational structure, policies, resources and risks. A number of tools, techniques, and frameworks are introduced.

Protecting Information Assets*
In this course students learn the importance of managing the information assets of the organization including logical, physical and environmental security. Disaster recovery and business continuity controls are also discussed.

Securing Digital Infrastructure/Cryptography*
Examines issues related to securing the components of a company’s electronic infrastructure. In this course students will study the hardware and software components, including networks, firewalls, operating system virtualization and cloud interfaces, their potential security vulnerabilities and approaches to securing their operations. Students become familiar with Digital Infrastructure at both the conceptual and practical level through lecture, in-class activities and homework exercises.

Ethical Hacking*
This course introduces student to the hacking strategies and tactics used by ethical or “White Hat” hackers. Methods of vulnerability exploitation to be used primarily in the process of Security Penetration will be explored in theory and in hands on exercises. The course will require simple programming using Open Source scripting languages and hacking tool kits. For that reason knowledge of and experience with computer programming is required

Data Analytics*
Examines the emerging approach of continuous-audit. This approach relies heavily on data analytics to examine datasets produced by audit and security controls (for instance, network log files). Basic data analysis concepts are presented and then applied to security or audit problems. Audit specific tools like ACL will be used in addition to general tools like Excel.

Security Architecture*
Examines the methodology by which an organization aligns its business strategy with its security operations. Both the current and desired future states of the business’ security efforts are described so that resources can be directed to the security efforts most needed to support the business.

Advanced Penetration Testing
This course introduces student to Penetration Testing. Methods of vulnerability assessment and exploitation are examines as a means of identifying areas requiring improved security and recommendation of recommended changes. The ethical, business governance and legal implication of penetration testing are examines. Specific techniques are examined in detail with the intent of giving the students a practical understanding of how Penetration Tests are conducted and laboratory-based experience in their actual conduct.

Intrusion Detection and Response
While all businesses work to be as secure as possible, it is agreed that no organization can be completely secure. Preventing attacks, quickly identifying successful attacks, detecting advanced persistent threats and monitoring systems activity in order to deter intrusions can result in significant business benefit This course examines the variety of tools and techniques used to do this work.

Cyber Security Capstone
In this course students are given the opportunity to demonstrate the capabilities they have developed throughout the program. This course prepares students for the SSCP examinations and requires them to demonstrate an ability to research emerging cyber security issues.

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Posts
Recent Comments
Archives
Categories