Loading...

Course Description

Cybersecurity threats are a serious issue for organizations in any industry, and learning how to prevent and fight against those threats are key to building a secure digital infrastructure. This course is designed for anyone who wants to learn how hackers attack, and then use that information to make their own networks and computers harder to attack. Throughout this course, you will be introduced to the types of attacks that can completely compromise systems and networks, and you’ll also get hands-on experience designing defensive mechanisms to either prevent the attacks or isolate them if prevention is not possible.

Is This Course For You?

The course is designed for anyone who is working in Information Technology in roles such as system administrators, network engineers, firewall administrators, Security Operations Center (SOC) analysts, engineers, managers, application designers and developers, security directors, and help desk personnel among others. The completion of both Information Technology Fundamentals and Networking Technologies is strongly recommended. If you’re taking this as a standalone course, we recommend that you have prior knowledge and fundamental skills in network security, including in-depth knowledge of the TCP/IP network protocol, functional skills in Unix and Linux, and ability to implement protocol analysis techniques.

What You’ll Learn

This applied course will give you both the knowledge and skills you need to understand different types of cyber attacks as well as how to use defensive mechanisms against them. Hackers use a variety of different techniques during cyber attacks, and being able to distinguish between the different types of attacks is key to ensuring you understand the best way to prevent intrusion in your systems as well as fight hackers who have made it past your initial defenses. You’ll get hands-on experience fighting the types of attacks you learn about, and you’ll walk away from this course with the tools you need to start fighting common cyber threats that you may encounter in a cybersecurity role.

How You’ll Learn

This 12-week course is fully online and asynchronous, which means you will gain access to the modules and be able to move through the course materials at your own pace. Your instruction will include both learning about cyber threats as well as practicing the techniques you can use to prevent and fight back against them. You will get hands-on experience with implementing these techniques so that you can walk away from this course with a complete understanding of how to use your new skills.

Skills You Walk Away With

By the end of this course, you will be able to:

  • Identify the potential weaknesses on a system and network
  • Explore requirements for vulnerability management
  • Deploy ingress and egress filters to reduce the risk to a network
  • Perform basic memory analysis to identify potential malware intrusions
  • Install decoys and triggers to identify sophisticated intrusions
  • Analyze and reduce a network's attack surface

 

Applies Towards the Following Certificates

Loading...
Enroll Now - Select a section to enroll in
Section Title
Cyber Defense Applications
Type
Online/Asynchronous
Dates
May 13, 2024 to Jul 26, 2024
Delivery Options
Course Fee(s)
Tuition non-credit $2,500.00
Drop Request Deadline
Jun 05, 2024
Transfer Request Deadline
May 12, 2024
Section Title
Cyber Defense Applications
Type
Online/Asynchronous
Dates
Sep 23, 2024 to Dec 06, 2024
Delivery Options
Course Fee(s)
Tuition non-credit $2,500.00
Drop Request Deadline
Oct 16, 2024
Transfer Request Deadline
Sep 22, 2024
Section Title
Cyber Defense Applications
Type
Online/Asynchronous
Dates
Jan 13, 2025 to Apr 04, 2025
Delivery Options
Course Fee(s)
Tuition non-credit $2,500.00
Drop Request Deadline
Feb 05, 2025
Transfer Request Deadline
Jan 12, 2025
Section Title
Cyber Defense Applications
Type
Online/Asynchronous
Dates
May 12, 2025 to Jul 18, 2025
Delivery Options
Course Fee(s)
Tuition non-credit $2,500.00
Drop Request Deadline
Jun 04, 2025
Transfer Request Deadline
May 11, 2025
Required fields are indicated by .