CYB-5210
×
CYB-5210 Foundations of Utility CybersecurityThis course introduces foundational cybersecurity concepts applied to utilities as part of critical infrastructure. Topics covered include: fundamental security concepts and nomenclature; types of utility networks and systems including information technology (IT) and operational technology (OT), such as industrial control systems (ICS) and supervisory control and data acquisition (SCADA); risk management concepts; the pairing of threats to defensive countermeasures; introduction to applicable standards and control frameworks; and presenting cybersecurity plans to decision makers. This course lays the foundation for the graduate certificate. It is recommended that this course be taken first. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Foundations of Utility Cybersecurity | 3 |
CYB-5220
×
CYB-5220 Cybersecurity Risk Management in Utility EnvironmentsIn this course, students will learn how to identify applicable cybersecurity risk mitigation models and apply them in an organizational context. They will develop the knowledge and skills needed to make recommendations related to the choice of risk mitigation security controls and to provide oversight for the implementation of those controls within information technology (IT) and operational technology (OT) systems. This course will give students the tools to develop risk models that reflect the organization's unique governance structure and corporate culture. Using risk analyses that are predicated upon a holistic risk picture (business, environment, compliance, etc.) of the organization, students will learn how to articulate and defend risk allocation recommendations to accept, transfer, mitigate, or ignore risk, and to communicate cybersecurity risks to peers and senior management in both IT and OT. This course will also expose students to relevant international utility-related cybersecurity regulations, standards, and guidelines. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cybersecurity Risk Management in Utility Environments | 3 |
CYB-5230
×
CYB-5230 Protective Security Controls in Utility Systems and NetworksIn this course students will learn how to identify, develop, and apply security controls in utility information technology (IT) and operational technology (OT) environments with a focus on protective security controls. These controls are implemented to mitigate inherent risks and reduce the chances of utility systems being compromised. Such controls include identity and access management, awareness and training, asset management, secure network architecture and segmentation, secure coding practices, personnel security, and physical security. Students will use risk-based frameworks, regulations, standards, best practices, and security control catalogs to identify and select applicable protective controls in utility environments. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Protective Security Controls in Utility Systems and Networks | 3 |
CYB-5240
×
CYB-5240 Monitoring, Detection, Response, and Recovery in Utility EnvironmentsThe students will learn methods and techniques for monitoring information technology (IT) and operational technology (OT) environments. Along with developing an expertise in system monitoring techniques, students will learn methods for detecting compromise and develop strategies for effectively responding to and recovering from compromise. Students will learn methods and techniques such as network baselining, perimeter and internal monitoring and defense, situational awareness, intrusion detection, detecting exploits, "kill chain" management, event analysis and correlation, incident response, evidence collection and preservation, and system recovery and restoration. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Monitoring, Detection, Response, and Recovery in Utility Environments | 3 |
CYB-5250
×
CYB-5250 Integrating Cybersecurity into the System Life CycleThis course focuses on integrating security into the entire system and solution life cycle. Topics include system planning, architecture, design, acquisition, development, implementation/operation, sustainment, and disposal. Students will learn the importance of ensuring that security practices are identified and integrated into utility networks and systems projects. In addition, this course will help students develop knowledge and skills needed for integrating security requirements into technology acquisitions and identifying and managing supply chain risks across life cycle. Using case studies, students will apply concepts learned throughout the program to solve real-world utility and network system security challenges. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Integrating Cybersecurity into the System Life Cycle | 3 |
Total Credit Hours: 15