In this course, students will learn the fundamentals of cybersecurity related to business operations and identify the concepts required to recognize attacks against enterprise networks as well as mission critical business applications.

In this course, students will learn about the Cybersecurity Academy and the resources that are available to academic partners.

In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure.

In this course, students will learn the fundamentals of network security and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure.

This course provides the student with an understanding of the fundamental tenants of
cybersecurity and covers the general security concepts involved in maintaining a
secure network computing environment. Students will learn the nature and scope of
today’s cybersecurity challenges, strategies for network defense, as well as detailed
information about next-generation cybersecurity solutions. Students will also deploy a
variety of security methodologies as well as technologies and concepts used for
implementing a secure network environment.

This course provides the student with an understanding of the fundamental tenants of
networking and covers the general concepts involved in maintaining a secure network
computing environment. Upon successful completion of this course, students will be
able to examine, describe general networking fundamentals and implement basic
networking configuration techniques.

This course provides the student with a general understanding of how to install, configure,
and manage firewalls for defense of enterprise network architecture. Students will learn the
theory and configuration steps for setting up the security, networking, threat prevention,
logging, and reporting features of next generation firewall technologies.

- Teacher: Keith Cantillon
- Teacher: Saravanan Rajagopal
This course provides the student with advanced information for how to
install, configure, and manage firewalls for defense of enterprise network
architecture. Students will learn the theory and extended configuration
features necessary for setting up traffic handling, advanced content/user
identification, quality of service, global protect, monitoring/reporting and
high availability of next generation firewall technologies.

- Teacher: Jim Boardman
- Teacher: Keith Cantillon
- Teacher: Saravanan Rajagopal
This competition course is designed to challenge
student candidates how to make decisions regarding protection of operational assets through the
analysis, comparison, and selection of advanced security tools, methodologies, and
implementation options. Additionally, student candidates will research and develop a
competition report, summary video, and presentation that at a minimum will include
methodologies for deploying end-to-end attack detection, alert triage, threat hunting,
investigation, orchestration, and automated response activities.
This competition course is designed to challenge student candidates how to make decisions regarding protection of operational assets through the analysis, comparison, and selection of advanced security tools, methodologies, and implementation options. Additionally, student candidates will research and develop a competition report, summary video, and presentation that at a minimum will include methodologies for deploying end-to-end attack detection, alert triage, threat hunting, investigation, orchestration, and automated response activities.

- Teacher: Keith Cantillon