Malware is designed to damage or disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Typical cyber threats and the dangers associated with them will be explained. Counter measures against these threats will also be introduced to assist in implementing the protective measures used to avoid them altogether.
Secure network design requires many layers of defense. Network design is critically important to prevent and detect intrusions and most importantly to reduce the overall risk to the organization. Many different strategies can be implemented in a well-designed network. The purpose of this module is to introduce the defense in depth concept and offer a familiarization on securing the organizational network.
A cyber threat has a constantly changing definition. With more and more devices being connected to networks and the internet each day it is imperative that we evolve our cyber threat program to match these definitions. In this module we will introduce new technologies, trends and services. We will discuss what they are and their vulnerabilities to assist in decision making for your organization.
Risk is defined as the combination of a threat and a probability assigned to that threat. It is important to understand what hazards are associated with our organization and take a proactive approach in mitigating them. This module explores how to manage risk, assigning priorities to them, and effectively managing a program that attempts to eliminate or reduce the risks involved.
This module will discuss strategies for building a robust cyber incident response plan. Overviews include members and roles of our incident response team and how we can limit damage, retain confidence, and reduce recovery time and costs by having a comprehensive incident response plan that takes a proactive approach in preparing for an inevitable incident.
A Culture of Security is the practice of minimizing the risks associated with a threat by collective effort. A comprehensive security program is an ever changing, ongoing, and engaging process in an organization’s security posture. In this module we cover elements of a successful security awareness program, training and exercises needed to design and implement a robust cybersecurity program.
This two-day course provides leaders and managers an overview of issues and activities associated with cyber security. Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
This five-day lecture course prepares information security professionals for the Certified Information Systems Security Professional (CISSP) examination. Lectures cover in detail the eight security domains required for the CISSP examination.
The UTSA CISSP Prep Course distinguishes itself by focusing on the demonstration and practical application of course competencies. Instructors do not 'teach for the test,' but rely heavily on their industry knowledge to educate participants on real world problem solving.