Cyber Operations, a more specific area of cybersecurity, is a highly technical field with a hardcore focus on both cyber offense and defense strategies. This course will provide an introduction to cyber operations fundamentals. Topics include Security fundamental principles, network architecture and security technologies, network traffic and protocol analysis, and offensive and defensive cyber operations and user experience.First day attendance is mandatory.Prerequisite: Admission to the MS in Cyber Operations Program or Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Graduate credits
Effective May 5, 2021 to present
- Recognize and understand the underlying fundamental cybersecurity principles, their interrelations and usage to achieve assured operations.
- Recognize and explain how failures in fundamental security design principles can lead to system vulnerabilities that can be exploited as part of an offensive cyber operation.
- Describe how networks work at the various layers of the TCP/IP Protocol suite.
- Analyze network traffic and major protocols that enable communications and data transfer.
- Recognize and apply the phases of a cyber-operations, what each phase entails, who has authorities to conduct each phase, and how operations are assessed after completion.
- Describe common security threats and attacks, their ramifications and how to safeguard against them.
- Describe, evaluate, and operate a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals.
- Describe the technologies and methods utilized to actively defend systems and networks
- Recognize user interface issues that will affect the implementation of and perception of security mechanisms and the behavioral impacts of various security policies.
- Develop approaches with the right balance of security and user convenience to mitigate user behaviors that undermines system security.
- Demonstrate ethical behavior appropriate to security-related technologies