Course Description
-
Course Name
Cyber Security Operations
-
Host University
University of Roehampton
-
Location
London, England
-
Area of Study
Computer Science, Criminology
-
Language Level
Taught In English
Hours & Credits
-
Overview
Cyber security is a continuously evolving field. This is particularly evident in terms of Tactics, Techniques and Procedures (TTPs) exhibited by adversaries and the subsequent response strategies employed by defending organisations. The consequences of a security breach or exploit can be extreme, particularly when attacks involve successful ransomware deployments.
In this module students will acquire an overview of defensive cyber security strategies that have been modelled on, or utilise, widely recognised frameworks and knowledge bases (e.g., NIST, MITRE ATT&CK). Indicative topics include vulnerability management, network monitoring, log file analysis, firewalls, IDS, IPS, SIEM, data and intelligence analytics, incident response, network forensics, incident management, orchestration strategies.
Course Disclaimer
Courses and course hours of instruction are subject to change.
Eligibility for courses may be subject to a placement exam and/or pre-requisites.
Some courses may require additional fees.
Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.
Please reference fall and spring course lists as not all courses are taught during both semesters.
Please note that some courses with locals have recommended prerequisite courses. It is the student's responsibility to consult any recommended prerequisites prior to enrolling in their course.