Course Overview

In this course techniques for assuring the continued operation of secure systems in contested environments will be explored. The course through lecture, labs and projects continue to students to use these techniques for the detection of, response to, and recovery from security incidents. Labs and projects for the course will utilize the Cybersecurity Sandbox.

Start

Your Future Now

Find out if online learning fits your lifestyle.