IT 511 THREATS, VULNERABILITIES, CONTROLS, AND COUNTERMEASURES

Organizations are under constant threats from malicious attackers internal and external to the organization. In order to respond and defend the organization against these attacks security professionals must have the knowledge and skills to assess cybersecurity threats and vulnerabilities and recommend and implements appropriate controls and countermeasures. This course will prepare cybersecurity incident handlers to manage security incidents by understanding common attack techniques, vectors and tools as well as defending against and/or responding to such attacks when they occur. This course will provide students with the foundation to prepare to take the GCIH (GAIC Certified Incident Handler) certification which focuses on detecting, responding, and resolving computer security incidents.

Credits

3

Prerequisite

IT 510

Distribution

INFORMATION TECHNOLOGY