3.00 Credits
This course provides students with a general understanding of cyber defense procedures used to prevent, detect, and combat cybersecurity threats through continuous security monitoring.?? Students will learn forensic techniques used to analyze and respond to incidents.?? This course prepares students for the industry CySA+ Certification Exam. **COURSE LEARNING OUTCOMES (CLOs)** At the successful conclusion of this course students will: 1. Understand the importance of system and network architecture concepts in security operations. (IT PLO 1,2,3,4) 2. Analyze indicators of potentially malicious activity. (IT PLO 1,2,3,4) 3. Compare and contrast threat-intelligence and threat-hunting concepts. (IT PLO 1,2,3,4) 4. Recommend controls to mitigate attacks and software vulnerabilities. (IT PLO 1,2,3,4) 5. Understand the use the appropriate cyber defense procedures, check compromise indicators, and apply basic digital forensics techniques. (IT PLO 1,2,3,4) 6. Understand and implement vulnerability scanning concepts and methods. (IT PLO 1,2,3,4) Prerequisites: IT 2700 (Grade C or higher). FA