CIS 440 Threat Hunting and Incident Response

This course will utilize offensive and defensive strategies to identify breaches, compromised network endpoints, and cybersecurity incident management. Students will be exposed to hardware and
software solutions for logging and incident response. Incident response plans regarding active events will be developed as well as post-incident review plans.

Credits

3

Distribution

CS