top of page
IHS Main Logo

Defense in Depth: A Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructure

IMPORTANT: Please select the following affliation. SHSU > College of Criminal Justice > Institute for Homeland Security (IHS) > Critical Infrastructure Security & Resilence (IHS)

2 Hours
$25.00 per Student
Course Length:
Cost: 

Course Description

This course introduces the principles and practical applications of the Defense-in-Depth strategy for cybersecurity, with a focus on protecting critical infrastructure (CI). As cyber threats become more sophisticated, the need for layered security has never been more urgent. Students will learn how to implement and manage comprehensive cybersecurity defenses that safeguard vital systems and data against evolving risks.

Course Objectives

  1. Understand the core concepts of cybersecurity and the CIA triad (Confidentiality, Integrity, Availability).

  2. Identify various types of cyber threats and vulnerabilities that target critical infrastructure.

  3. Apply the Defense-in-Depth strategy using a layered security model.

  4. Evaluate and implement physical, administrative, and technical controls.

  5. Conduct risk assessments and apply mitigation strategies aligned with CIS Controls.

  6. Recognize insider threats and develop methods for detection and prevention.

  7. Explore the role of cybercrime, cyber warfare, and information warfare in national security.

Target Audience

The target audience for this course includes IT and cybersecurity professionals, as well as operational technology personnel and physical security personnel. These individuals play key roles in securing network systems, managing cyber incidents, and ensuring the physical safety of facilities.

Course Length:
Cost: 
$25.00 per Student
2 Hours

IMPORTANT: Please select the following affliation. SHSU > College of Criminal Justice > Institute for Homeland Security (IHS) > Critical Infrastructure Security & Resilence (IHS)

Course Description

This course introduces the principles and practical applications of the Defense-in-Depth strategy for cybersecurity, with a focus on protecting critical infrastructure (CI). As cyber threats become more sophisticated, the need for layered security has never been more urgent. Students will learn how to implement and manage comprehensive cybersecurity defenses that safeguard vital systems and data against evolving risks.

Course Objectives

  1. Understand the core concepts of cybersecurity and the CIA triad (Confidentiality, Integrity, Availability).

  2. Identify various types of cyber threats and vulnerabilities that target critical infrastructure.

  3. Apply the Defense-in-Depth strategy using a layered security model.

  4. Evaluate and implement physical, administrative, and technical controls.

  5. Conduct risk assessments and apply mitigation strategies aligned with CIS Controls.

  6. Recognize insider threats and develop methods for detection and prevention.

  7. Explore the role of cybercrime, cyber warfare, and information warfare in national security.

Target Audience

The target audience for this course includes IT and cybersecurity professionals, as well as operational technology personnel and physical security personnel. These individuals play key roles in securing network systems, managing cyber incidents, and ensuring the physical safety of facilities.

bottom of page