CY4700 Defensive Cyberspace Operations
This course explores methods to discover adversarial presence on a network and defend against adversarial TTPs (tactics, techniques, and procedures). Topics include, but are not limited to: the cyber kill chain, techniques the adversary uses to remain hidden within a compromised network, adversarial command and control, malware triage, mitigation of malware and eviction of an adversary from an operational network. Labs assignments will reinforce material taught in class.
Prerequisite
CY3000 and
CS3690; or consent of the instructor
Lecture Hours
3
Lab Hours
3