CYS526 Cyber Attacks and Defense
Description
This course investigates security issues, vulnerabilities, and mechanisms to identify, respond to and prevent cyberattacks and to build active defense systems. The course will follow the formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintain access and reporting. Ethical Hackers are computer and network experts who attack security systems on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
Prerequisites
CYS500 Foundations of Cybersecurity
Sections
| Term Dates | Term & Duration | Format |
|---|---|---|
| March 2, 2026 to April 26, 2026 | Spring II - 8 Week | Online |
| June 29, 2026 to August 23, 2026 | Summer II - 8 Week | Online |