Back

Applied Threat Analysis

95-889

Units: 6

Description

This course will deconstruct what governments and industry define as cyber threats by providing students with an understanding of vulnerabilities, exploits, malware, network communications, and threat actors.  Additionally the course will cover indicators of compromise and teach how these indicators are used in responding to cyber incidents.  Students will learn to develop threat indicators and formulate advice on how to counter and mitigate threats.

Learning Outcomes

Upon completion of this course the student should be able to:

  • describe the common types of indicators of compromise and how they are used in threat analysis and incident response
  • understand different types of malware and how they are used in cyber attacks
  • understand different types of software vulnerabilities and how they are leveraged by threat actors
  • understand how to monitor network communications to detect cyber attacks
  • understand how cyber threats are mitigated and countered

Prerequisites Description

None

Syllabus