Earn Your University of Fairfax
Information Security Professional Practices Certificate
IA8060 Intrusion Detection, Attacks, and Countermeasures
In this course, students will examine common attack methods, technologies and countermeasures. Students will also gain the skills needed to recognize various stages and methods of attack on the enterprise.
- Name and describe the steps in conducting a session in hijacking
- Analyze the different types of attacks used against web servers
- Describe the anatomy of an attack
- Discuss the methodology of an attacker using a password cracker
- Differentiate between different Web browsers in regards to security and privacy features
- Describe the steps for performing SQL injection
IA8020 Security Policies, Standards and Procedures
In this course, students will explore digital forensics and computer investigations. This course will provide insight on conducting an investigation, reviewing certification requirements, determining the best data acquisition method, processing a computer investigation scene, evaluating needs for digital forensics tools, and applying forensics skills and techniques.
- Summarize how to conduct an investigation, including critiquing a case
- Describe components used to build a business case for developing a forensics lab
- Explain guidelines for seizing digital evidence at the scene
- Describe methods for validating and testing digital forensics tools
- Describe standard procedures in network forensics and network-monitoring tools
- Explain how to approach investigating social media communications
IA8030 Design, Development and Evaluation of Security Controls
In this course, you will learn the concepts to plan, govern, implement, and manage an information security program. It is holistic and comprehensive, and provides a path to consider all aspects of information security and to integrate security into the fabric of the things we depend on and use. It provides specific guidance on strategy, policy development, risk identification, personal management, organization, and legal matters, and places them in the context of a broader ecosystem.
- To analyze the factors influencing the need for an information security program and what a program consists of.
- To evaluate information security governance and risk management.
- To evaluate information security models and management practices.
- To analyze information security policies and contingency planning.
- To evaluate personnel security and protection mechanism.
Join the Cybersecurity Elite
U of F Cybersecurity Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.