May 10, 2024  
2023-2024 General Catalog 
    
2023-2024 General Catalog
Add to Pathway (opens a new window)

NET 563 - Log and Threat/Risk Analysis


Course Department: Business
Last Date of Approval: Fall 2022

3 Credits
Total Lecture Hours: 30
Total Lab Hours: 30
Total Clinical Hours: 0
Total Work-Based Experience Hours: 0

Course Description:
This course presents the learner with an introduction to information security vulnerability assessment fundamentals, followed by in-depth coverage of the Vulnerability Assessment Framework. Through a detailed, practical analysis of threat intelligence, modeling, and automation, students will learn the skills necessary to not only use the tools of the trade, but also, to implement a transformational security vulnerability assessment program. This course will help students refine their critical thinking skills as they evaluate various technology topics and concepts while searching for underlying connections between the technology and how to apply those concepts in a lab setting, which is a skill that should be beneficial in any/all types of technology careers. This course will also help students gain hands-on technology literacy which will be of vital significance when making important work-related decisions.

Prerequisites: NET 110 - Microcomputer Fundamentals , NET 178 - Intro to Cyber Security , NET 562 - Firewall Security , NET 612 - Fundamentals Network Security   
Mode(s) of Instruction: traditional/face-to-face, virtual, and/or online

Credit for Prior Learning: This course offers an opportunity for students to earn Credit for Prior Learning for skills that they have brought with them to Iowa Central. For more information, please ask the instructor and see the Iowa Central Community College catalog.

Course Fees: Face-to-Face: None; Online: 8-week online students will have a per credit hour e-book fee automatically charged to their account.

Common Course Assessment(s): None

Student Learning Outcomes and Objectives:
Student Learning Outcomes:

a. Plan an Incident Response
b. Apply an Incident Response Plan
c. Analyze Threat Detection
d. Classify User and Entity Behavior Analytics (UEBA)
e. Construct a SIEM
f. Assess Network Traffic Analysis
g. Identify a Security Operations Center (SOC)
h. Explain Gartner Magic Quadrant for SIEM
i. Evaluate the MITRE ATT&CK Framework

Objectives: 

a. Incident Response
b. Incident Response Plan
c. Threat Detection
d. User and Entity Behavior Analytics (UEBA)
e. SIEM
f. Network Traffic Analysis
g. Security Operations Center (SOC)
h. Gartner Magic Quadrant for SIEM
i. The MITRE ATT&CK Framework



Add to Pathway (opens a new window)