Metropolitan State University

 My Plan for Fall 2020
 Wish List:  

Login to view your plan.

 Wait List:  

View/Modify Schedule  Registered:  Expand My Plan  
Remove from Wait List

< New Search Continue to Review My Plan >

CYBR 645 - Cyber Threat Hunting and Intelligence
Fall 2020, Section 50

search actionsID #Subj#SecTitleDatesDaysTimeCrdsStatusInstructorDelivery MethodLoc
Add to Wish List Find Equivalent Courses Add To Waitlist (Disabled)
001165 CYBR 645 50 Cyber Threat Hunting and Intelligence
08/22 - 12/13
na - na
2.0 Open Peeler, Vincent
Mostly Online Location: z MnSCU Metropolitan State University

Meeting Details
8/22/2020 - 12/13/2020 n/a na - na n/a Peeler, Vincent

  • Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.Note: This is a mostly online course with required proctored exams that may require a webcam and microphone. Intermediate computer/Internet skills required. For online learning and course access information go to
  • Online Participation Required First Week of Class.

Location Details
Offered through: Metropolitan State University.
Campus: Metropolitan State University. Location: z MnSCU Metropolitan State University.

Seat Availability
Status: Open Size: 24 Enrolled: 14 Seats Remaining: 10

Prerequisites (Courses and Tests)
[CYBR 641 - Cyber Operations Fundamentals]
  • Restricted to the following major(s): Cyber Operations MS, Cyber Operations GC
  • Requires students to be admitted.

Full refund is available until August 28, 2020, 11:59PM CST.
The last day to add this course is August 28, 2020. The last day to drop this course is August 28, 2020.
The last day to withdraw from this course is November 23, 2020.

Tuition and Fees (Approximate)

Tuition and fee information will be available after July 15, 2020.

Course Level

The course will provide students with knowledge and practical skills in the field of cyber threat hunting and intelligence that can be leveraged to defend against sophisticated network intrusions and loss of proprietary information. The course will discuss various phases of the intelligence lifecycle including developing intelligence requirements, collecting, analyzing, and disseminating information; and using cyber threat intelligence to improve security at the tactical, operational, and strategic levels.

Add To Wait List