Metropolitan State University


 My Plan for Summer 2021
 Wish List:  

Login to view your plan.

 Wait List:  

View/Modify Schedule  Registered:  Expand My Plan  
Remove from Wait List

< New Search Continue to Review My Plan >

CYBR 611 - Vulnerability Discovery and Exploitation
Summer 2021, Section 50

search actionsID #Subj#SecTitleDatesDaysTimeCrdsStatusInstructorDelivery MethodLoc
Add to Wish List Find Equivalent Courses Add To Waitlist (Disabled)
000368 CYBR 611 50 Vulnerability Discovery and Exploitation
05/08 - 08/15
M
6:00pm - 9:00pm
3.0 Open Helmus, Jonathan
Completely Online - Synchronous Location: z MnSCU Metropolitan State University


Meeting Details
DatesDaysTimeBuilding/RoomInstructor
5/8/2021 - 8/15/2021 M 6:00pm - 9:00pm n/a Helmus, Jonathan

Notes
  • Note: This course combines combined synchronous online meetings with significant online work. Course has required synchronous online meetings that require intermediate computer/Internet skills, webcam and microphone. For online learning and course access information go to www.metrostate.edu/solr.
  • First day attendance is mandatory.
  • Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.

Location Details
Offered through: Metropolitan State University.
Campus: Metropolitan State University. Location: z MnSCU Metropolitan State University.

Seat Availability
Status: Open Size: 24 Enrolled: 11 Seats Remaining: 13

Restrictions
  • Restricted to the following major(s): Cyber Operations GC, Cyber Operations MS

Add/Drop/Withdraw
Full refund is available until May 14, 2021, 11:59PM CST.
Adding course is closed. Dropping course is closed.
The last day to withdraw from this course is July 26, 2021.

Tuition and Fees (Approximate)

Tuition and Fees (approximate):

Tuition -resident: $1,489.35
Tuition -nonresident: $1,489.35
Approximate Course Fees: $111.33

Course Level
Graduate

Description
Vulnerability analysis and its connection to exploit development are core skills for one involved in cyber operations. This course covers vulnerability discovery and exploitation. The focus is to understand the pattern of vulnerabilities and attacks to allow students to experience protection, risk mitigation, and identify vulnerabilities in new contexts. Topics will include buffer overflows, privilege escalation attacks, input validation issues, vulnerability discovery (fuzzing and crash dump analysis), exploit development, and mitigations (e.g., DEP, ASLR, ¿).

Add To Wait List