courses.uww.edu »

Graduate Cyber Security

Jump to Menu

Graduate Cyber Security

2023 Summer Term

Disclaimer

  • This course listing is informational and does not guarantee availability for registration.
  • Please click through to view the class schedule to see sections offered for your selected term.
  • Sections may be full or not open for registration. Please use WINS if you wish to register for a course.

3 Units

MANAGEMENT OF INFORMATION ASSURANCE AND SECURITY

CYBER 731

This course offers an applied guide that includes the practical steps institutions can take to achieve digital resilience and protect against cyber-attacks while creating value from technology investments and innovation. Cybersecurity must move up the corporate and political agenda if organizations are to remain safe and realize the full potential value of innovation.


3 Units

CYBER INCIDENT RESPONSE, BUSINESS CONTINUITY, AND RISK MANAGEMENT

CYBER 734

The course covers business continuity planning and implementation, a systematic approach used to create and validate a plan for maintaining continuous business operations before, during, and after disasters or disruptive events. It also covers disaster recovery, which is aimed at assessing the risks and stopping the effects of disasters as quickly as possible, and addressing the immediate aftermath.


3 Units

COMPUTER FORENSICS

CYBER 742

Computer forensics involves the preservation, identification, extraction and documentation of evidence stored on a computer. This course covers both the principles and practices of computer forensics that include data acquisition and data recovery; volume analysis; file system analysis; network forensics; evidence hiding and steganography; tools and techniques for investigating computer intrusions; scripting for forensics; and the legal and ethical implications.


3 Units

CLOUD SECURITY

CYBER 758

This course offers both broad and in-depth study of cloud security issues related to data and computation outsourcing from perspectives of operation, management, and design. Topics include identity and access management, vulnerability assessment, intrusion detection, forensics, and incident handling on cloud; security policies, management, and regulatory compliance in cloud; and cloud security architecture design and implementation.

Jump to Top

Catalog Selection

Course Navigation

Go ToGo To ResetReset

Class Filter

RefreshRefresh ResetReset

Links