To support you and your education, BCIT is adapting applied learning in formats appropriate to the unfolding global situation. Spring and Summer PTS classes are being delivered in an online format unless you are notified otherwise.
The Cybersecurity Operations course provides the fundamental knowledge and skills that are required for a Security Analyst to work in an enterprise's Security Operations Centre (SOC). The skills developed are those that are needed to monitor and detect as well as investigate, analyze and report on security events. The Cybersecurity Operations course will allow students develop knowledge and use tools to protect enterprise network systems, as well as detect existing cybersecurity risks, threats and vulnerabilities in those enterprise systems. Although there are no prerequisites for Cybersecurity Operations, it is strongly recommended that students have a background in Networking, Linux and Windows prior to taking the course.
The delivery format for this course has changed from in-person/in-class to ONLINE DELIVERY. No class on Saturday, October 10th (Thanksgiving Weekend). There are no mandatory requirements for this course. However, it is strongly recommended that students have a background in Networking, Linux and Windows prior to taking the course. Note: BCIT reserves the right to cancel courses. In the event of a part-time studies course cancellation, you will be notified at least two business days prior to the course start. Please ensure that your contact information is current in the system.
Upon successful completion of this course, the student will be able to:
Describe, compare and identify network concepts.
Describe the fundamentals of the TCP/IP protocol.
Describe network applications and some of the security challenges associated with these applications.
Articulate basic cryptography principles.
Identify endpoint attacks and interpret log data to identify events in Windows and Linux.
Articulate fundamental cybersecurity operations principles.
Identify the roles and responsibilities in a Security Operations Center.
Provide examples technologies used in cybersecurity operations.
Provide examples of the tools used in cybersecurity operations.
Provide examples of the regulations and frameworks available for cybersecurity operations.
Monitor enterprise systems.
Detect vulnerabilities and threats in enterprise systems.
Investigate, analyze and respond to security incidents.
Effective as of Winter 2019
If you have a comment or question about this course, please complete and submit the form below.
Interested in being notified about future offerings of CITX 1187 - Cybersecurity Operations?
If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.