Credits: 3Description A survey of emerging and leading technologies in the cybersecurity field. Research, evaluate, and recommend emerging technologies. Determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations.
Student Learning Outcomes
Evaluate emerging technologies and their security relevant issues.
Specify the laws that enable U.S. entities the authority to perform cyber operations.
Review the phases of a well-organized cyber operation and determine the goals and objectives of each phase.
Explain specific phases of a cyber operation in network traffic.
Review potential motivations that might prompt an entity to perform a cyber operation.
Prerequisite:CSEC 105B; and either CIT 274B or CSEC 281B all with a grade of C or better; or Instructor approval