Cyber Security (INF 2201)

Term: 2024-2025 Fall Semester

Faculty

Alan P. PoettkerShow MyInfo popup for Alan P. Poettker
[email protected]
Office hours:
  • Monday 9:00 AM to 4:30 PM
  • Monday 9:00 AM to 4:30 PM
  • Tuesday 9:00 AM to 4:30 PM
  • Tuesday 9:00 AM to 4:30 PM
  • Wednesday 9:00 AM to 4:30 PM
  • Wednesday 9:00 AM to 4:30 PM
  • Thursday 9:00 AM to 4:30 PM
  • Thursday 9:00 AM to 4:30 PM
  • Friday 9:00 AM to 4:30 PM
  • Friday 9:00 AM to 4:30 PM
  •  
    Duke Russell MillerShow MyInfo popup for Duke Russell Miller
    Email address is hidden, click here to email
     

    Schedule

    Mon-Tue-Wed-Thu-Fri, 8:05 AM - 11:55 AM (8/26/2024 - 12/19/2024) Location: MAIN GRAY G305

    Description

    This course provides the skills required to qualify for exciting and growing opportunities in security operation centers as an analyst or incident responder. The course focuses on how to monitor, detect and respond to cybersecurity threats. Plus, covers cryptography, host-based security analysis, security monitoring, computer forensics, attack methods and incident reporting and handling. Uncovering cybercrime, cyber espionage and other threats to the integrity of networks is an exciting new areas that spans all industries.

    Cyber Security (INF 2201)

    Term: 2024-2025 Fall Semester

    Faculty

    Alan P. PoettkerShow MyInfo popup for Alan P. Poettker
    [email protected]
    Office hours:
  • Monday 9:00 AM to 4:30 PM
  • Monday 9:00 AM to 4:30 PM
  •  
    Duke Russell MillerShow MyInfo popup for Duke Russell Miller
    Email address is hidden, click here to email
     

    Schedule

    Mon-Tue-Wed-Thu-Fri, 8:05 AM - 11:55 AM (8/26/2024 - 12/19/2024) Location: MAIN GRAY G305

    Description

    This course provides the skills required to qualify for exciting and growing opportunities in security operation centers as an analyst or incident responder. The course focuses on how to monitor, detect and respond to cybersecurity threats. Plus, covers cryptography, host-based security analysis, security monitoring, computer forensics, attack methods and incident reporting and handling. Uncovering cybercrime, cyber espionage and other threats to the integrity of networks is an exciting new areas that spans all industries.