Apr 25, 2024  
2022-2023 General Catalog 
    
2022-2023 General Catalog [ARCHIVED CATALOG]

Add to Pathway (opens a new window)

NET 563 - Log and Threat/Risk Analysis


Last Date of Approval: Fall 2022

3 Credits
Total Lecture Hours: 30
Total Lab Hours: 30
Total Clinical Hours: 0
Total Work-Based Experience Hours: 0

Course Description:
This course presents the learner with an introduction to information security vulnerability assessment fundamentals, followed by in-depth coverage of the Vulnerability Assessment Framework. Through a detailed, practical analysis of threat intelligence, modeling, and automation, students will learn the skills necessary to not only use the tools of the trade, but also, to implement a transformational security vulnerability assessment program. This course will help students refine their critical thinking skills as they evaluate various technology topics and concepts while searching for underlying connections between the technology and how to apply those concepts in a lab setting, which is a skill that should be beneficial in any/all types of technology careers. This course will also help students gain hands-on technology literacy which will be of vital significance when making important work-related decisions.

Prerequisites: NET 110  , NET 178  , NET 562  , NET 612  
Mode(s) of Instruction: traditional/face-to-face, virtual, and/or online

Credit for Prior Learning: This course offers an opportunity for students to earn Credit for Prior Learning for skills that they have brought with them to Iowa Central. For more information, please ask the instructor and see the Iowa Central Community College catalog.

Course Fees: Face-to-Face: None; Online: 8-week online students will have a per credit hour e-book fee automatically charged to their account.

Student Learning Outcomes and Objectives:
Student Learning Outcomes:

a. Plan an Incident Response
b. Apply an Incident Response Plan
c. Analyze Threat Detection
d. Classify User and Entity Behavior Analytics (UEBA)
e. Construct a SIEM
f. Assess Network Traffic Analysis
g. Identify a Security Operations Center (SOC)
h. Explain Gartner Magic Quadrant for SIEM
i. Evaluate the MITRE ATT&CK Framework

Objectives: 

a. Incident Response
b. Incident Response Plan
c. Threat Detection
d. User and Entity Behavior Analytics (UEBA)
e. SIEM
f. Network Traffic Analysis
g. Security Operations Center (SOC)
h. Gartner Magic Quadrant for SIEM
i. The MITRE ATT&CK Framework



Add to Pathway (opens a new window)