Course Overview
In this course techniques for assuring the continued operation of secure systems in contested environments will be explored. The course through lecture, labs and projects continue to students to use these techniques for the detection of, response to, and recovery from security incidents. Labs and projects for the course will utilize the Cybersecurity Sandbox.