Skip to main content

Apply now! Spring priority deadline is October 1.

CYBR 442 Cyber Operations

In today's digital landscape, safeguarding information as a vital asset is paramount. This course delves into the operational aspects of managing and securing corporate network infrastructures and business information systems. Students will develop situational awareness of organizational networks and learn to manage and maintain a defensive infrastructure comprising log servers, network firewalls, and intrusion detection systems. Key topics include information security operations, access control, risk management, business continuity planning, disaster recovery, and ethics. Additionally, the course addresses the challenges of securing cloud assets, aligning with select objectives from the CompTIA Cloud+ certification, to equip students with strategies to enhance cloud security and address threats such as misconfigurations, unauthorized access, and data breaches. Overlap: ICS 484.

Prerequisites

Special information

First day attendance is mandatory.
Formerly: ICS 484. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYB/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits

Effective May 6, 2020 to present

Learning outcomes

General

  • Evaluate the challenges of securing cloud assets and implement strategies to enhance cloud security, addressing threats such as misconfigurations, unauthorized access, and data breaches.
  • Distinguish various IT activities and roles involved in managing and securing computing systems, emphasizing responsibilities in cyber operations and threat mitigation.
  • Assess and apply ethical decision-making frameworks in cybersecurity, using them to analyze real-world scenarios such as privacy, surveillance, and cyber warfare.
  • Analyze specific phases of a cyber operation by examining network traffic patterns, attack vectors, and adversary tactics.
  • Develop and implement proactive cyber defense strategies, leveraging security policies, risk assessments, and incident response methodologies.
  • Synthesize and evaluate Advanced Persistent Threats (APTs) and other cyber adversary attacks by mapping their Tactics, Techniques, and Procedures (TTPs) to established attack frameworks.

Spring 2025

Section Title Instructor books eservices
50 Cyber Operations Hepp, Alex Books for CYBR-442-50 Spring 2025 Course details for CYBR-442-50 Spring 2025

Summer 2025

Section Title Instructor books eservices
50 Cyber Operations Hepp, Alex Books for CYBR-442-50 Summer 2025 Course details for CYBR-442-50 Summer 2025

Fall 2025

Section Title Instructor books eservices
01 Cyber Operations Hepp, Alex Books for CYBR-442-01 Fall 2025 Course details for CYBR-442-01 Fall 2025