| DPI905 | CISCO Network Security | TBD | TBD | TBD |
| | This course provides the knowledge and skills required to develop a network security infrastructure. Students, through the use of core security technologies learn to configure, troubleshoot and monitor network security devices such as switches and routers to recognize and mitigate network vulnerabilities and threats. A variety of tools in a lab setting are used to develop, test and administer effective security policies. Upon completion of this course, students will have the necessary knowledge to acquire CISCO CCNA Security certification. |
| DPI906 | Malware Analysis and Response | TBD | TBD | TBD |
| | There is an increasing number of stealing millions of records and billions of dollars by hackers. Ongoing security assessments are imperative to help identify new/existing vulnerabilities and develop a plan for remediation. A penetration test is a simulated cyber-attack against your computer system to find the weaknesses in your defense systems before a hacker does and check for exploitable vulnerabilities. Penetration testing can involve the attempted breaching of any number of application systems to uncover vulnerabilities. It simulates real-world attack scenarios to discover security weaknesses. It can compromise networks or applications. |
| DPI907 | IT Physical and Environmental Security | TBD | TBD | TBD |
| | This course covers the principles and practices of physically securing an organizations people, facilities and data resources against unauthorized access, theft, sabotage and other security breaches. Topics will include, but are not limited to, facility access control, environmental and safety measures, social engineering techniques, physical security penetration testing, locks and lock picking, video surveillance systems, and biometric authentication systems. Students will also learn how to develop policy and procedures for physical security, including appropriate incident response. |
| DPI911 | Incident Response | TBD | TBD | TBD |
| | Despite best efforts, evolving computer threats mean that network defenses are frequently penetrated and security incidents have become a regular occurrence in our I.T. infrastructures. It is accepted that it is a matter of when, rather than if, an incident will occur. This course covers various aspects of computer incident response. Topics include incident response preparedness, incident detection and characterization, data collection, data analysis and remediation. |
| DPI912 | Python for Programmers: Sockets and Security | TBD | TBD | TBD |
| | This course focuses on developing intermediate and advanced competencies in socket programming, and is informed and guided by information technology and cybersecurity concepts, concerns, and problem sets. Students will explore developing applications on TCP/IP as well as in higher level protocols. Applications developed may include forensic, defensive, and offensive security tools. |
| DPI913 | Cloud Infrastructure and Security | TBD | TBD | TBD |
| | In todays rapidly changing environment enterprises are adopting cloud technology at a great rate. The cloud allows businesses to quickly deploy new business applications and scale them on demand. At the same time, from a security perspective, use of the cloud introduces new layers of abstraction to IT infrastructure which increases complexity, therefore introducing new vulnerabilities. The student will learn to build a private cloud, to understand key elements of cloud technology, and to protect cloud infrastructure and applications running on it. |
| DPI914 | Social Engineering | TBD | TBD | TBD |
| | Social engineering is one of the most common attack methods in IT and the most difficult to counter. The course provides a broad overview of social engineering, including cognitive mechanisms utilized by social engineers and their use as attack vectors, their attack cycles/stages, along with the common tools used to do research and execute the attacks, attack vector countermeasures including the tools and techniques. Practical work in this course covers various aspects of the tools and techniques used in attacks and for countermeasures. |
| DPI924 | Advanced Application Security | TBD | TBD | TBD |
| DPS950 | Introduction to Microsoft Cloud Technologies | Not offered | Online | Not offered |
| | This course introduces cloud computing using Azure services, core solutions and management tools, security features, identity and privacy, governance and compliance, as well as cost management and service level agreements through lecture and hands-on exercises. |