Metropolitan State University


 My Plan for Fall 2017
 Wish List:  

Login to view your plan.

 Wait List:  

View/Modify Schedule  Registered:  Expand My Plan  
Remove from Wait List

< New Search Continue to Review My Plan >

ICS 484 - Cyber Operations
Fall 2017, Section 01

ID #Subj#SecTitleDatesDaysTimeCrdsStatusInstructorDelivery MethodLoc
000832 ICS 484 01 Cyber Operations
08/22 - 11/28
T
6:00pm - 9:20pm
4.0 Open Schmitt, Andrew
Location: z MnSCU Metropolitan State University
Building/Room: St Johns Hall L9


Meeting Details
DatesDaysTimeBuilding/RoomInstructor
8/22/2017 - 11/28/2017 T 6:00pm - 9:20pm St Johns Hall L9 Schmitt, Andrew

Notes
  • Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.

Location Details
Offered through: Metropolitan State University.
Campus: Metropolitan State University. Location: z MnSCU Metropolitan State University.

Seat Availability
Status: Open Size: 30 Enrolled: 24 Seats Remaining: 6

Prerequisites (Courses and Tests)
[ICS 382 - Computer Security AND ICS 382 - Computer Security]
Restrictions
  • Requires minimum credits: 30

Add/Drop/Withdraw
Full refund is available until August 27, 2017, 11:59PM CST.
Adding course is closed. Dropping course is closed.
The last day to withdraw from this course is November 20, 2017.

Tuition and Fees (Approximate)

Tuition and Fees (approximate):

Tuition -resident: $910.12
Tuition -nonresident: $1,856.92
Approximate Course Fees: $137.88

Course Level
Undergraduate

Description
Information is an asset that must be protected. Without adequate protection or network security, many individuals, businesses, and governments are at risk of losing that asset. It is imperative that all networks be protected from threats and vulnerabilities so that a business can achieve its fullest potential. Security risks cannot be eliminated or prevented completely; however, effective risk management and assessment can significantly minimize the existing security risks. In order to provide effective protection to the organization┬┐s critical infrastructure and services, continuous monitoring as well as various processes, procedures, and technology is required to detect and prevent cyber-attacks, breaches, and security violations. In addition, existence of a comprehensive incident response plan is vitally connected to the survivability of an organization after a severe security breach or compromise of critical business operations. This course focuses on the operational aspect of managing challenges inherent in protecting a corporate network infrastructure and business information systems. The student will develop situational awareness of an organization┬┐s network and learn to manage, and maintain a defensive infrastructure that comprises of log servers, network firewalls, web application firewalls, and intrusion detection systems. Additional topics include information security operations, access control, risk management, business continuity planning, disaster recovery, and ethics.

Add To Wait List