2022-2023 College Catalog [ARCHIVED CATALOG]
|
CIS 245 - Cyber Analytics, Detection, and Response 3 Credits, 4 Contact Hours 2 lecture periods 2 lab periods
Knowledge and skills required to configure and use threat detection and monitoring tools, data analysis, vulnerability identification, and threats identification.
Prerequisite(s): CIS 225 Information: This course may help in the preparation for the Comp TIA CySA+ certification and examination. Gen-Ed: Meets AGEC-S Options requirement
.png)
Course Learning Outcomes 1. Implement a vulnerability management process and incorporate analysis of the results of the scan.
2. Develop a response plan based on evaluation of incident impact.
3. Prepare a toolkit with appropriate forensics tools and communication plan.
4. Recommend remediation of security issues related to identity and access management.
5. Configure threat-detection tools.
6. Apply environmental reconnaissance techniques using appropriate tools. Outline:
- Threat Management
- Practices used to secure a corporate environment
- Penetration testing
- Reverse engineering
- Training and exercises
- Risk evaluation
- Network threats
- Network segmentation
- Endpoint security
- System hardening
- Network access control
- Network reconnaissance
- Real-time data analysis
- Data correlation
- Logging
- Systems reconnaissance
- Service discovery
- Social engineering
- Topology discovery
- Vulnerability Management
- Vulnerability management process
- Asset discovery and inventory
- Scanning and reporting
- Remediation
- Common vulnerabilities
- Virtual infrastructure
- Servers
- Endpoints
- Mobile devices
- SCADA and ICS
- Cyber Incident Response
- Impact of incident
- Threat classification
- Data classification
- Severity and prioritization
- Forensic evaluation
- Physical forensics kits
- Investigation software
- Identifying an incident
- Network symptoms
- Host symptoms
- Application symptoms
- Post incident recovery
- Security Architecture and Tool Sets
- Common policies, controls, and procedures
- Regulatory frameworks
- Review of sample policy, controls, and procedures
- Verification and auditing
- Identity and access management
- Context-based authentication
- Endpoint repositories
- Federation and single sign-on
|