Defense and Forensics
Cyber Law and Policy
CYBV 454: Malware Threats & Analysis
CYBV 454: Malware Threats & Analysis – Acquisition of the methodologies used to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malwares, to fully understand the software’s functionality and specifications.
CYBV 388: Cyber Investigations and Forensics
Study of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low-level hardware calls, and file operations.
CYBV 435: Cyber Threat Intelligence
An in-depth investigation of threat actors and the techniques they employ to attack networks. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintain access and reporting is examined.