Your feedback has been sent to our team.
—
—
3.76
Spring 2025
Provides managers with the essential framework needed to design and develop an effective cybersecurity program. Explores methods used to raise general security awareness, review current industry practices, and develop expertise needed to adapt policies to achieve confidentiality, integrity, and availability of organizational assets and data.
—
—
3.85
Spring 2025
Reviews the essential components of a security assessment and explores how to integrate methodology with company needs. Covers the pitfalls connected with conducting a security assessment. Addresses how to create security assessment reports, identifying threats and vulnerabilities and managing organizational audits and compliance metrics. Case studies are used to illustrate course concepts.
—
—
3.83
Spring 2025
Provides students with practical, real-world experience with the various wireless network security core competencies. Specifically, the course provides the most popular hacking, cracking, and wireless security network analysis tools on a CD ROM and trains students to use them to assess and secure wireless networks.
No course sections viewed yet.