Security Operations

The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.

Student smiling while sitting outside, using a laptop.
Syllabus

Course Topics

Incident Response Simulation

Engage in simulation exercises that mirror real-world cyber breaches to develop skills in identifying attack vectors, executing response plans, and managing recovery steps effectively.

Post-Incident Analysis and Communication

Practice conducting thorough post-incident reviews to extract lessons learned, with a focus on clear, concise, and impactful communication to leadership and other stakeholders under pressure.

Digital Evidence Collection

Engage in hands-on practices for secure and methodical evidence collection, emphasizing the integrity and admissibility of digital evidence. Techniques will include creating verified copies of data and ensuring a clear chain of custody.

Forensic Tools

Gain practical experience with forensic tools such as Kali Linux and Wireshark. Students will learn to utilize these tools for in-depth analysis of digital evidence, identifying and interpreting key data from various sources.

Forensic Analysis of Operating Systems and Emails

Learn specialized techniques for investigating operating systems and analyzing email evidence. Students will explore how to retrieve and interpret logs and data from Windows, Linux, Mac, iOS, and Android, and how to uncover the true origins and paths of email communications.

Forensic Reporting and Documentation

Learn the art of compiling detailed forensic reports that clearly document the investigation process, findings, and adherence to legal standards. Emphasis will be placed on creating reports understandable by both technical and non-technical stakeholders.

Course Level

300

Skills Covered

  • Incident Response
  • Digital Forensics
  • Investigation
  • Security Tools
  • Linux
  • Operating Systems
  • Communication

Common Prerequisites

All courses listed may not be required. Discuss with your advisor to learn more.

  • Introduction to Cybersecurity
  • Network and System Security

Disclosure

This course is delivered online through an institution of the Lower Cost Models Consortium (LCMC) that is different than your degree-granting institution that awards the academic credit for the course.