CBRDFCRTU - Cyber Defense

Download as PDF

Applied Sci & Tech, Col of Undergraduate Certificate CERTU - Undergraduate Certificate

Program Type

Undergraduate Certificate

College

College of Applied Science & Technology

Career

Undergraduate

Program Description

This certificate provides students with the skills necessary to design defensible network architectures; employ active and passive defensive technologies; arm those defensive technologies with tactical Cyber Threat Intelligence (CTI); conduct Network Security Monitoring (NSM) and Threat Hunting operations; respond to security incidents; and how to manipulate network environments in order to defend against advanced cyber threats. Students will conduct interactive exercises to secure Linux and Windows operating systems; conduct network traffic flow analysis and forensics; conduct anomaly/intrusion detection and identification; identify and block command and control operations; conduct Incident Response (IR) activities; and how to implement and manage Zero Trust Networks (ZTN) within on-premises and cloud-based environments.

Learning Outcomes

LEARNING OUTCOMES
- Describe, evaluate, and construct a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals.
- Demonstrate a thorough understanding of how networks work at the infrastructure, network and applications layers; how they transfer data; evaluate network protocols work to enable communication; and how the lower-level network layers support the upper ones.
- Evaluate and assess the various types of vulnerabilities and their underlying causes; how security principles interrelate and are typically employed to achieve assured solutions; and explain how failures in fundamental security design principles can lead to system vulnerabilities that can be = exploited as part of an offensive cyber operation.
- Evaluate and assess an adversary's motivation, intentions, and methods are collected, analyzed, and disseminated to help security personnel and business staff to align resources and protect critical assets within an enterprise architecture.