programs
CYBER RISK MANAGEMENT FRAMEWORK (RMF) PROGRAM
fc rmF 101
risk management policy and methods
fc rmF 201
risk management methodology
Integrating enterprise and cloud systems risk management, students apply the NIST RMF as they complete project deliverables and communicate project results. In addition, students develop in-depth analytic competencies.
In this virtual practicum, focusing on integrated enterprise on-prem and cloud systems, students develop the capability to evaluate a test case scenario system, develop an SSP, and select and/or write appropriate security controls. Students then document results.
Focusing on integrated enterprise on-prem and cloud systems, students develop the capability to evaluate system security, analyze system assessment reports to make recommendations for a POA&M, comply with all Authorization to Operate package requirements, and strategically develop ISCM. Recommendations based on completed assessment and authorization project for the enterprise on-prem and cloud systems.
fc rmF 301
Categorize and implement
Project assignments for this course will include hacking wireless networks and mobile phones, cryptography, cloud computing, scanning networks, social engineering, and session hijacking.
Cyber concepts
Linux Fundamentals
Networking basics
Linux logging
Web hosting
Security Operations
Snort IDS
Vulnerability Assessments
Digital Forensics
IoT Security
Microsoft OS Management
Splunk
fc rmF 401
Monitor and authorize
fc rmF 501
Testing and Vulnerability Management
Continued – Learn the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
- Security Monitoring
Threat Hunting
Incident Response Process & Procedures
Analyzing Indicators of Compromise
Basic Digital Forensics
Group/Team Activities Project (real-world scenario)
Career Portfolio Wrap Up
Certification Prep & Tips
FC RMF SP
Specializations (AI, ML, 5g, uas)
Students will learn how to conduct a risk assessment, create a target profile, implement an action plan, and determine, analyze, and prioritize gaps. Specializations include UAS, 5G, artificial intelligence, and machine learning.
* Based on the statistical average of industry certification. After the exam is taken and passed by the certification holder.
** Specialties may be developed with University researchers.
cyber defense competency program
FC IOD 101 Part 1
Security Fundamentals/Understanding Computer Network Exploitation
Cyber concepts
Linux Fundamentals
Networking basics
Linux logging
Web hosting
Security Operations
IoT Security
Microsoft OS Management
Splunk
SIEM & SOAR
Firewalls
Battlepath – SOC 1 & 2
Battlepath – MITRE ATT&CK
FC IOD 102 Part 2
In addition, students will learn through each stage of offensive operations methodologies using tradecraft, stealth, and detection avoidance as the key principles. Students will gain proficiency with open-source penetration tools and learn techniques in vulnerability scanning, remote and client-side exploitation, and advanced post-exploitation techniques targeting both Windows and Unix based operating systems.
FC IOD 201
Cyber Operations and Intermediate Incident Response
Cyber concepts
Linux Fundamentals
Networking basics
Linux logging
Web hosting
Security Operations
Snort IDS
Vulnerability Assessments
Digital Forensics
IoT Security
Microsoft OS Management
Splunk
FC IOD 301
Windows, Linux, and Network-based Intrusion detection and analysis
FC IOD 401
Malware Analysis, Threat Assessment, Reverse Engineering, and Behavioral Malware Analysis
FC IOD SP
Specializations (AI, ML, 5g, uas)
Students participate in a Cyber Information Operations Defense related to specific topics created and maintained by the University’s top researchers.
* Based on the statistical average of industry certification. After the exam is taken and passed by the certification holder.
** Specialties may be developed with University researchers.
University of Kentucky provides 3 unique Cybersecurity Certificate Programs, leveraging a U.S. Department of Homeland Security recognized curriculum and taught by practitioners. See how you can advance and excel in the lucrative Cybersecurity Industry today. Take this survey and see if it’s the right program for you!