Post Secondary

Examines both the practical and conceptual skills that build the foundation for understanding cyber security investigation and analysis including; vulnerability exploits, malware analysis; and hardening of systems to protect against exploitation. Learners will investigate a compromised system and learn to analysis systems to find malicious indicators. By the end of this course, the learner will be able to detect the key areas where an exploitation may reside and use various Windows built-in tools as well as 3rd party tools to detect malicious activity.

Prerequisites: 10-151-105 SECURITY+ 3 and 10-151-114 SECURE DESIGN or with instructor's consent..

Availability & Registration

We offer the following class sections for this course (10-151-115). View more class specific details and registration information by selecting a class number.