Cyber Security and Operations Courses

Cyber Security and Operations Courses

 

Under construction.  See the for more detailed descriptions of each course.

 


Covers technical overview of terminology and concepts associated with the field of Information Assurance.


This Web-based DL class covers basic overview of terminology and concepts associated with the field of Information Assurance.


Covers ethical analysis and decision-making in the context of information technology.


Covers the DoD perspective on protecting critical infrastructures, including both cyber and physical systems.


Covers management concerns associated with computer-based information systems.


This course covers a broad range of topics related to the standards, protocols, technology, and management infrastructure necessary to field an enterprise-level identity management (IdM) solution.


Covers a broad range of topics in security for networked and internetworked computer systems.


Covers network system vulnerabilities and the related mitigating techniques.


Covers management concerns associated with machine control systems


This course reviews the technical details of biometric identification and verification.


Covers implementation of protection for monolithic and distributed secure computer systems.


Covers access control implementations associated with database security.


Covers methods used to specify, model, and verify computational systems providing access control.


Covers topics in software, communications, and data security.


This course examines protocol design and protocol-analysis techniques.


Study of how malware is constructed and operated.


Covers the concepts and techniques that are needed to systematically elicit, derive and validate security requirements.


Covers the standards, processes and regulatory compliance requirements that are necessary to design, implement and test new secure systems.


Introduction to methods of intrusion detection in computer systems and networks and the possible methods of automatic response.


Covers the fundamentals of computer forensics as it might be used in the context of DoN/DoD activities.


Provides a basis for understanding the potential vulnerabilities in networks systems by applying a problem-solving approach to obtaining information about a remote network.


Emerging techniques used in cyber operations


Covers the C&A process as applied to DoD and Federal information systems.