Call Number | 10904 |
---|---|
Day & Time Location |
W 6:10pm-8:00pm ONLINE ONLY |
Points | 3 |
Grading Mode | Standard |
Approvals Required | None |
Instructor | Corey Hirsch |
Type | SEMINAR |
Method of Instruction | On-Line Only |
Course Description | Competition, espionage, theft, sabotage, and warfare, traditionally carried out “in the field” have erupted online. State-sponsored cyber-attacks target critical infrastructure, financial systems, government agencies, political adversaries, retail, and consumer databases, and the intellectual property of technology firms. This course covers the defensive techniques that address perimeter and data security. Business model relationships to security architecture are examined, in particular managing vulnerability introduced through mergers and acquisitions, and Active Directory migrations. Service and Administrative account management and other aspects of network design will be analyzed. Students will investigate recent newsworthy cases and devise countermeasures aimed at both incident prevention and effective CIRT (Cyber Incident Response) management. |
Web Site | Vergil |
Subterm | 05/22-06/30 (A) |
Department | Technology Management |
Enrollment | 18 students (50 max) as of 1:06PM Saturday, May 10, 2025 |
Subject | Technology Management |
Number | PS5135 |
Section | D01 |
Division | School of Professional Studies |
Campus | Morningside |
Note | Program approval required for non-TMGT students |
Section key | 20232TMGT5135KD01 |