This course covers foundational topics such as how to identify external threats and vulnerabilities and examines the common threats and vulnerabilities of an enterprise. Students in the course will explore how to use threat data and intelligence sources to identify emerging threats. This data is then used to help identify vulnerabilities, examines cloud computing and tools for assessing vulnerabilities.
Students will learn about key cybersecurity principles, common vulnerabilities, and best practices for protecting digital assets and discuss how to apply such knowledge to analyze, design and manage secure systems in the real world. For each unit of credit, a minimum of three hours per week with one of the hours for class and two hours for studying/preparation outside of class is expected.
Prerequisites
None