Course

Course Summary
Credit Type:
Course
ACE ID:
SKIL-0215
Organization:
Location:
Online
Length:
36.25 hours (52 weeks)
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 Cybersecurity
Description

Objective:

The course objective is to prepare learners for the critical security roles in keeping organizations secure. The course starts by providing potential security analysts with foundational knowledge on the planning and implementing security measures that combat risks associated with cloud, AI, and machine learning solutions. Skilled Security Analysts can dive in and start working on their Forensics Analyst skills by exploring different discovery, collection, and remediation methods. From there, learners move into the Vulnerability Analyst role, which focuses more on continually testing and hardening all security layers. The final part of the course prepares learners to become Security Architects by bringing together all the insights and knowledge acquired to model system security, implement governance policies, and create secure infrastructure design and self-healing systems.

Learning Outcomes:

  • Explain session and risk management, auditing, incident response, and develop a comprehensive data breach response plan
  • Recognize security threats, including APT attacks, and implement defense best practices, including securing end users against attackers
  • Comprehend the importance of NACs, gateways, subnetting, DNS, and describe security protocols, authentication, encryption, and secure network development
  • Install and configure honeypots, perform detailed pen testing, and use digital forensic techniques and investigative approaches to detect and address network anomalies
  • Explain the importance of security governance, integrate regulations with organizational policies, manage threats and vulnerabilities, and implement defensible architecture and zero-trust models

General Topics:

  • Information Security: APT Defenses, NACs, Gateways, and Networking Protocols
  • Security Architecture: Subnetting, DNS, Hardened Topologies, and Continual Infrastructure Testing
  • Security Practices: Governance, Honeypots, Pen Testing, and Risk Management
  • Incident Response: Auditing, Incident Tracking, Response, and Breach Notification
  • Executive Security: Understanding Threats and Protecting Information
  • Anomaly Detection: Techniques and Network Anomaly Detection
  • Cryptography: Introduction, PKI, and Encryption Best Practices
  • Digital Forensics: Techniques, Ethics, and Privacy
  • End-User Security: Perspectives and Protection Strategies
  • Risk Analysis and Cyber Security Audits Intrusion Detection and Prevention: Best Practices
  • Secure Coding and Ethical Hacking Best Practices
  • Automating Security: Intelligent Orchestration and Incident Processing
  • Security Governance: Regulatory Integration and Rules of Engagement
  • Unified Security: Playbook Approach and Security Architect Role
  • Leadership: Development Plans, Aligning Goals, and Organizational Learning
Instruction & Assessment

Instructional Strategies:

  • Laboratory
  • Practical Exercises

Methods of Assessment:

  • Examinations
  • Quizzes

Minimum Passing Score:

70%
Supplemental Materials