Skip to main content
Print this page
/Institutions/Walsh-College/json/catalogs.json
8698C621-E417-4E9B-8E3D-6BF4091B1B26
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
8698c621-e417-4e9b-8e3d-6bf4091b1b26
https://searchproxy.smartcatalogiq.com/search
e0149c6f-7c1e-459a-8e46-af2f53d35f0d
course
/Institutions/Walsh-College/json/current/Walsh-College-Catalog-local.json
/Institutions/Walsh-College/json/current/Walsh-College-Catalog.json
Contents
Welcome to Walsh College
General Information
Academic Calendar
Admission to Walsh College
Readmission to Walsh College
Financial Aid and Scholarships
Student Services
International Student Information
Veteran Student Information
Walsh College Programs
Walsh College Courses
ACC - Accounting
BL - Business Law
BTC - Business & Technology
BUS - Business
CE - Continuing Education Courses
COM - Communications
DCT - Doctoral
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
000 Level Courses
200 Level Courses
300 Level Courses
400 Level Courses
IT 402
IT 403
IT 405
IT 407
IT 408
IT 410
IT 412
IT 413
IT 414
IT 415
IT 416
IT 417
IT 419
IT 422
IT 430
IT 431
IT 440
IT 445
IT 451
IT 452
IT 453
IT 456
IT 460
IT 461
IT 462
IT 463
IT 483
IT 490
IT 499
500 Level Courses
700
MDL - Moodle Orientation
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research Methods
RSD - Residency
TAX - Taxation
Professional Development
Policies and Procedures
Walsh College Leadership
Walsh College Faculty
Addendum
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 422
ADVANCED TEAM-BASED ATTACK/DEFEND TECHNIQUES
This course is designed to synthesize knowledge of the hacking and counter hacking strategies. In a semester long project, students will simulate the functioning of a real-world cybersecurity team by actively addressing a variety of security challenges. Each work team will be required to not only prepare offensive attacks and defensive security measures, but also to formally to test their proposed countermeasures to ensure accuracy. As a result, this problem-based course also enables students to hone the communication (written and verbal), contribution, and collaboration skills necessary for success as a well-round security professional.
Credits
3
Prerequisite
IT 417
and
IT 419
Distribution
INFORMATION TECHNOLOGY