CYBR410 — Applied Cyber Defense

3 credits Catalog-Derived

Hands-on course with practical experiences in cybersecurity threats, mitigations, malware analysis, and cyber defense scenarios.

5
Objectives
30
Matches
30
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
69.2% Information Security Engineers 20t
60.7% Penetration Testers 19t
64.8% Digital Forensics Analysts 13t
61.8% Computer Systems Engineers/Architec 12t
46.9% Software Quality Assurance Analysts 11t

Learning Objectives & Matches

LO1

Defend computer systems and networks against active cyber attacks

10 O*NET task matches
Batch:
Digital Forensics Analysts
65% ok

Maintain cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Digital Forensics Analysts
63% ok

Write cyber defense recommendations, reports, or white papers using research or experience.

Claude Opus 4.6 denied
Penetration Testers
59% ok

Develop and execute tests that simulate the techniques of known cyber threat actors.

Claude Opus 4.6 approved at 300
Digital Forensics Analysts
58% ok

Recommend cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Digital Forensics Analysts
57% ok

Conduct predictive or reactive analyses on security measures to support cyber security initiatives.

Claude Opus 4.6 approved at 300
Penetration Testers
57% ok

Identify new threat tactics, techniques, or procedures used by cyber threat actors.

Claude Opus 4.6 approved at 300
Penetration Testers
56% ok

Update corporate policies to improve cyber security.

Claude Opus 4.6 denied
Penetration Testers
55% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
Network and Computer Systems A 3.7/5
50% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 approved at 200
Penetration Testers
49% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 approved at 200
LO2

Analyze malware samples to understand behavior, capabilities, and indicators of compromise

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
LO3

Implement and configure security controls including access controls and monitoring systems

10 O*NET task matches
Batch:
Telecommunications Engineering 4.1/5
80% ok

Implement controls to provide security for operating systems, software, and data.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
62% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 400
Web Developers
62% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Information Security Engineers 4.4/5
61% ok

Assess the quality of security controls, using performance indicators.

Claude Opus 4.6 approved at 400
Web Administrators 4.2/5
61% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Information Security Engineers 3.7/5
59% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 300
Information Security Analysts 3.8/5
58% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.9/5
57% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 300
Information Security Engineers 4.1/5
57% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 approved at 300
Web Administrators 4.5/5
56% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
LO4

Respond to and investigate security incidents following incident response procedures

10 O*NET task matches
Batch:
Information Security Engineers 4.2/5
69% ok

Develop response and recovery strategies for security breaches.

Claude Opus 4.6 approved at 400
Information Security Engineers 3.9/5
61% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 400
Penetration Testers
61% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 approved at 400
Blockchain Engineers
60% ok

Implement catastrophic failure handlers to identify security breaches and prevent serious damage.

Claude Opus 4.6 denied
Information Security Engineers 4.2/5
60% ok

Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.

Claude Opus 4.6 approved at 300
Web Administrators 4.8/5
59% ok

Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.

Claude Opus 4.6 denied
Digital Forensics Analysts
59% ok

Maintain cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Information Security Analysts 4.0/5
57% ok

Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.

Claude Opus 4.6 approved at 300
Penetration Testers
57% ok

Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.

Claude Opus 4.6 approved at 300
Penetration Testers
57% ok

Prepare and submit reports describing the results of security fixes.

Claude Opus 4.6 approved at 300
LO5

Develop and test security mitigation strategies for known attack vectors

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)