4 credits
cyber-req
CAE-CD; CAE-CO
CSCD 438 — Vulnerability Analysis
Methods for identifying, analyzing, and mitigating software and system vulnerabilities. Topics include fuzzing, exploitation techniques, patch analysis, CVE management, and vulnerability disclosure processes.
DCWF work roles this course develops
-
CS-541 Vulnerability Assessment Analyst
primary
Vulnerability Assessment Analyst.
-
CE-551 Red Team Specialist
strong
Red Team Specialist.
-
CS-622 Secure Software Assessor
strong
Secure Software Assessor.
Knowledge Units covered
-
CO-M6 Cybersecurity Foundations
primary
Vulnerability Analysis (CAE-CO Mandatory).
-
CD-PTT Penetration Testing
strong
Penetration Testing.
-
CD-SSA Software Security Analysis
strong
Software Security Analysis.
ABET student outcomes
Student outcomes defined by the ABET Computing Accreditation Commission. Outcome 7 applies to cybersecurity-designated programs.
- ABET 1 strong Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
- ABET 7 primary Apply security principles and practices to maintain operations in the presence of risks and threats. (Cybersecurity / Cyber Operations only.)
O*NET civilian tasks prepared
Tasks drawn from the O*NET records for the occupations that most directly correspond to the DCWF roles this course develops.
- SOC 15-1212.00: Monitor use of data files and regulate access to safeguard information in computer files.
- SOC 15-1212.00: Document computer security and emergency measures policies, procedures, and tests.
- SOC 15-1212.00: Monitor current reports of computer viruses to determine when to update virus protection systems.
- SOC 15-1212.00: Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- SOC 15-1299.04: Identify security system weaknesses using penetration tests.
- SOC 15-1299.04: Develop infiltration tests that exploit device vulnerabilities to evaluate their security.
- SOC 15-1299.05: Develop response plans for potential network intrusions.
- SOC 15-1299.05: Perform risk assessments for information security.