Skip to main content
Print this page
Select a Catalog
Walsh College Academic Catalog 2024-2025
Walsh College Transfer Resources
Walsh College Academic Catalog 2023-2024
Archive Catalogs
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
12b51007-a6b1-4247-813a-121c71f218ae
https://searchproxy.smartcatalogiq.com/search
d41021bb-dfaf-4074-bfe9-bab90a34a165
course
/Institutions/Walsh-College/json/2022-2023/Walsh-College-Catalog-2022-2023-local.json
/Institutions/Walsh-College/json/2022-2023/Walsh-College-Catalog-2022-2023.json
Contents
Welcome to Walsh College
Academic Calendar & Important Dates
General Information
Academic Policies and Requirements
Walsh College Degree Programs
Undergraduate Degree Programs
Graduate Degree Programs
Dual Degree Programs
Graduate Certificates
Doctoral Degree Programs
Courses
ACC - Accounting
BL - Business Law
BTC - Business & Technology
COM - Communications
DCT - Doctoral
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
200
300
400
500
IT 501
IT 502
IT 505
IT 506
IT 510
IT 511
IT 512
IT 520
IT 530
IT 531
IT 532
IT 533
IT 534
IT 536
IT 537
IT 538
IT 540
IT 541
IT 542
IT 544
IT 545
IT 546
IT 547
IT 550
IT 551
IT 552
IT 553
IT 554
IT 555
IT 556
IT 565
IT 566
IT 567
IT 575
IT 590
IT 599
KET - Kettering University Courses
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research
TAX - Taxation
Walsh College Leadership
Walsh College Faculty
Walsh College Board of Trustees
Walsh College History
Notice of Nondiscrimination
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 511
THREATS, VULNERABILITIES, CONTROLS, AND COUNTERMEASURES
Organizations are under constant threats from malicious attackers internal and external to the organization. In order to respond and defend the organization against these attacks' security professionals must have the knowledge and skills to assess cybersecurity threats and vulnerabilities and recommend and implements appropriate controls and countermeasures. This course will prepare cybersecurity incident handlers to manage security incidents by understanding common attack techniques, vectors and tools as well as defending against and/or responding to such attacks when they occur. This course will provide students with the foundation to prepare to take the GCIH (GAIC Certified Incident Handler) certification which focuses on detecting, responding, and resolving computer security incidents.
Credits
3
Prerequisite
IT 510
Distribution
INFORMATION TECHNOLOGY