CYBR 442 Cyber Operations
In today's digital landscape, safeguarding information as a vital asset is paramount. This course delves into the operational aspects of managing and securing corporate network infrastructures and business information systems. Students will develop situational awareness of organizational networks and learn to manage and maintain a defensive infrastructure comprising log servers, network firewalls, and intrusion detection systems. Key topics include information security operations, access control, risk management, business continuity planning, disaster recovery, and ethics. Additionally, the course addresses the challenges of securing cloud assets, aligning with select objectives from the CompTIA Cloud+ certification, to equip students with strategies to enhance cloud security and address threats such as misconfigurations, unauthorized access, and data breaches. Overlap: ICS 484.
First day attendance is mandatory.
Formerly: ICS 484. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYB/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Prerequisites
Special information
Formerly: ICS 484. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYB/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits
Effective May 6, 2020 to present
Learning outcomes
General
- Evaluate the challenges of securing cloud assets and implement strategies to enhance cloud security, addressing threats such as misconfigurations, unauthorized access, and data breaches.
- Distinguish various IT activities and roles involved in managing and securing computing systems, emphasizing responsibilities in cyber operations and threat mitigation.
- Assess and apply ethical decision-making frameworks in cybersecurity, using them to analyze real-world scenarios such as privacy, surveillance, and cyber warfare.
- Analyze specific phases of a cyber operation by examining network traffic patterns, attack vectors, and adversary tactics.
- Develop and implement proactive cyber defense strategies, leveraging security policies, risk assessments, and incident response methodologies.
- Synthesize and evaluate Advanced Persistent Threats (APTs) and other cyber adversary attacks by mapping their Tactics, Techniques, and Procedures (TTPs) to established attack frameworks.
Spring 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Cyber Operations | Hepp, Alex | Books for CYBR-442-50 Spring 2025 | Course details for CYBR-442-50 Spring 2025 |
Summer 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Cyber Operations | Hepp, Alex | Books for CYBR-442-50 Summer 2025 | Course details for CYBR-442-50 Summer 2025 |
Fall 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
01 | Cyber Operations | Hepp, Alex | Books for CYBR-442-01 Fall 2025 | Course details for CYBR-442-01 Fall 2025 |