Provides students with an introduction to the policies, techniques, and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat Intelligence (CTI) products; implementation of Network Security Monitoring (NSM) and Hunt Teaming (HT) operations; employment of Incident Response (IR) plans; and Threat and Environment Manipulation techniques (TEM) will be presented, and students will use hands-on activities to practice and implement active defense methodologies.
Course Units
3
Instructor(s)
- Colin Brooks
- Michael Galde
- Ryan Hoy
- Thomas Jewkes