Use this page to maintain syllabus information, learning objectives, required materials, and technical requirements for the course. |
CS 285 - Cybersecurity Operations |
---|
Associated Term:
Summer 2019
Learning Objectives: Upon successful completion of this course, the student should be able to: 1. Learn basic incident analysis and methods, using industry standard tools. 2. Explain basic event correlation, normalization, and metrics of event data. 3. Describe common attack vectors against networks and hosts. 4. Understand SOC workflow management system and automation. 5. Interpret log data to identify malicious activity on Windows and Linux hosts. 6. Using security monitoring techniques, apply the processes of identifying sources and types of data and events. Required Materials: Technical Requirements: |
Return to Previous | New Search |