top of page




The hands-on Cybersecurity (CS) course delivers information on identity theft, viruses, malware, and cyber intrusions relating to our critical infrastructures like the power grid, and financial systems. These incidents are increasingly common and can have devastating personal and national security consequences. The course addresses various threats to computer systems and networks, and explains their implications on both an individual and national level. It also covers the growing body of laws, regulations, directives, and guidelines that influence both our personal, organizational, and national response to this significant threat. Through lecture, classroom discussion, computer demonstrations and exercises, students see examples of how to deal with threats using the three types of countermeasures defined by the National Institute of Standards and Technology (NIST): Management(what organizational steps can address this problem most effectively?), Operational (how can we respond to day-to-day computer incidents?) and Technical (how do we configure our computer and network systems for maximum resistance to these problems?). Each student is assigned a computer and applies newly learned skills via classroom exercises. Exercises include testing password strength, identifying network vulnerabilities, sniffing/eavesdropping to compromise information and recovering valuable information and evidence through digital forensics. Students return to their own work environment ready to implement their new knowledge.

The course includes tools used in class which the students take with them to enhance the cybersecurity posture of their own unique computer and network environment. An essential take-away resource list helps to expand knowledge, skills, and abilities in the important field of cybersecurity even after the course is finished.


The course benefits those who have management responsibility for the security of their computers and networks. This course is a must for job titles such as FSO, CSSO, ISSM, security manager, however, all computer-users benefit from this instruction.


  • Gain a greater awareness of the increasing cyber threat to our computing environments. Awareness is the first step in improving your computer security posture.

  • Acquire tools and training that will allow you to test the strength of your own computer security countermeasures through hands-on exercises in class.

  • Analyze the security risks in your own unique environment so that you can use your limited security budget in the most effective manner possible.


  • Identify the weak points/vulnerabilities in your computer and network systems

  • Analyze the cybersecurity threats to your systems (and there are many)

  • Assess the security risks associated with your computer and network systems

  • Select and prioritize the most effective cybersecurity security countermeasures for your unique systems

  • Apply your security budget to the most critical problems in your system, so as to maximize your ROI

  • Use security tools in class to analyze computer system vulnerabilities and countermeasures

  • Energize your annual computer security training through use of tools and demonstrations you will learn in class

  • Discover additional security resources that can help you in the never-ending task of keeping your computer and network systems secure

  • Take home security tools you can use to enhance your cybersecurity posture

bottom of page