Big data needs big protection. As computer networks grow, so does the quantity of vulnerable information. 90 percent of the world’s data was created just within the last two years, and that data provides a wealth of insight at our fingertips, but it can also be detrimental in the wrong hands. As global trade becomes increasingly digital, the risks continue to rise. News of large-scale cybersecurity threats and cyber-attacks dominate the headlines all too often in today's information age; big-brand companies losing data, being hacked, or otherwise losing out to online hackers. As we continue to gather, process, and transmit these vast amounts of data, the need to defend and protect it becomes critically important.
Offered in partnership with edX.
edX, part of 2U Inc., works with respected universities and organizations to deliver innovative, skills-based training to a community of over 45 million learners around the world to support them at every stage of their lives and careers. edX delivers boot camps through an immersive learning experience with expert services and valuable resources. As of 2021, graduates have been hired by 6,700+ companies, including more than 62% of the Fortune 100.
Learning Format Online
Duration 24 weeks
*Duration times can vary, talk to your advisor for more information.
Total Modules 6 Modules
How to identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
Methods to analyze malware to identify its origin and purpose, and determine methods for uninstalling it
How to perform Python programming along with Bash and scripting
Best practices for conducting vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities
Individuals looking to expand their knowledge in cybersecurity; technical professionals who want to better understand how to keep data secure; managers in charge of monitoring the confidentiality, availability, and integrity of client data; or those looking to get their feet wet in the world of networking and security.
Help Center | Resources
Got questions? Explore our Help Center for more info.