None
This course prepares students to maintain and analyze system and network security of on-premise and cloud-based systems. Topics include identity and access management, automation tools for provisioning, deployment, and management of resources, and challenges in securing networked architectures.
Obtain current textbook information by viewing the campus bookstore online or visit a campus bookstore. Check your course schedule for the course number and section.
Access to high-speed Internet.
None
- Design a Security Operations Center (SOC). (CCC 1, 2, 3, 4; PGC 1, 2, 3, 4)
- Evaluate and implement technologies that enable fault tolerant architectures. (CCC 1, 2, 3; PGC 1, 3)
- Analyze and respond appropriately to security incidents. (CCC 1, 2, 4; PGC 1, 3)
- Implement threat hunting procedures to detect malicious activity. (CCC 1, 2, 4; PGC 1, 3)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Design a Security Operations Center (SOC).
- Explain SOC fundamentals.
- Select the appropriate metrics that can be used for a basis of action.
- Develop response capability plans aligned with business requirements.
- Select Security Incident and Event Management (SIEM) to meet business requirements.
- Configure SIEM to collect appropriate metrics.
- Develop a report to communicate meaningful metrics to a business.
- Use industry standard procedures for privileged access to networked resources.
- Evaluate and implement technologies that enable fault tolerant architectures.
- Use and manage container resources.
- Automate provisioning of container resources to support business operations.
- Implement and monitor resources for availability and responsiveness.
- Design architectures to support system resilience and availability.
- Analyze and respond appropriately to security incidents.
- Define industry standard incident handling procedures.
- Compare and contrast incidents versus events.
- Discuss tools used to estimate and track costs associated with incidents.
- Determine appropriate communication and actions given a scenario.
- Analyze output from Intrusion Detection System/Intrusion Prevention System (IDS/IPS) to recognize an incident.
- Describe the purpose of wireless IDS/IPS.
- Describe the steps of a kill chain.
- Implement threat hunting procedures to detect malicious activity.
- Explain the concept of passive intrusion monitoring.
- Explain the concept of active intrusion deterrents.
- Explain the purpose and function of threat hunting.
- Configure passive intrusion monitoring tools to detect malicious activity.
- Configure active intrusion deterrents to thwart malicious activity.
The grade will be determined using the Delaware Tech grading system:
90 | – | 100 | = | A |
---|---|---|---|---|
80 | – | 89 | = | B |
70 | – | 79 | = | C |
0 | – | 69 | = | F |
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Solve technology-related problems using critical thinking and troubleshooting skills.
- Articulate the role of the technology professional in organizations to support the ethical use of information technology.
- Apply fundamental security concepts and strategies for maintaining and securing information technology.
- Read and interpret technical information and effectively communicate to a wide range of audiences using oral, print, and multimedia strategies.
- Demonstrate the importance of lifelong learning that empowers personal and professional growth.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.