Introducing our new Digital Transformation certificate series from Emory Goizueta Business School - Learn More

Security Bundle - Logistics

Program Type

Micro-Credential

Program Format

Online

Instruction Format

Instructor Led

Courses

1 course

Duration

3 Months

Next Start

Flexible Start Dates

course 002

Program Overview

A 5-course overview of cybersecurity, focusing on essential security practices in the Logistics Industry. This virtual, asynchronous program offers in-depth knowledge, real-world application, and expert-guided learning.

What You'll Learn

  • Octave/Matlab Experience
  • Experience with different privacy and data security laws
  • Knowledge on diverse civic and criminal cases dealing with digital evidence
  •  Autopsy and FTK Imager hands-on experience

Admission Requirements

  • 18 years of age or older

Curriculum & Tuition

Required Courses

Tuition

Average Cost Per Course: $2,463

Curriculum Details

Sample courses include:

Security Principles & Foundations: This module provides an overview of the cybersecurity field and its related concepts. An introduction to cybersecurity terminology, best practices, principles and standards, planning and management of cybersecurity functions and assets are included. This module will provide a foundation for understanding common threats and attacks and the methods and tools to defend and protect against them, an overview of human, organizational, social, and legal issues related to cybersecurity. and concepts which meet national standards in cybersecurity.

Cryptography: This module provides an overview of the cryptography field and its related applications. The statistical properties of digital data types such as text, image, and sound are introduced. Basic cryptographic substitution and permutation methods are discussed together with simple software tools. This module presents introduction to symmetric key and public key standards such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), RSA Public-key Cryptosystem, and ElGamal Public-key Cryptosystem. Applications such as data encryption, message authentication, and digital signature are included. Concepts are reinforced with many programming laboratory-exercises throughout the course.

Digital Forensics: This module covers the fundamentals of digital forensics. Topics will include historical issues, key concepts, and tools and techniques of the trade. In addition, reporting methods will be discussed. Various open-source tools will be used in the lab portion of the module.

Risk Analysis: This module provides an overview of the fundamental techniques and approaches to identify, asses, and mitigate cybersecurity risk. Topics include identification of cybersecurity risks, assessment and mitigation approaches. This module will provide case studies related to cybersecurity risk analysis in the healthcare industry.

Cyber Threat Hunting: This module covers the basics of cyber threat hunting in a secure operations center. Students will learn the mindset of the adversary and methods to identify new and emerging cyber threats in an organizational environment. Topics include log analysis, event correlation, open-source threat intelligence, use of AI in threat identification, honeypots, and threat sharing. Students will practice new skills in a simulated threat environment.

Why Choose Louisville

Founded in 1798, the University of Louisville (UofL) is a vital ecosystem that creates thriving futures for students, community and beyond. Recognized by the Carnegie Foundation as both a Research 1 and a Community Engaged university, UofL is uniquely positioned to impact lives in areas of student success and research and innovation, while dynamic connections with local and global communities provide unparalleled opportunities. Through its approach to education, innovation and connection UofL is committed to shape a better future for all.

Average Cost Per Course: $2,463

Additional tuition reductions and flexible payment options may be available!

Career Pathways

Computer Systems Analysts
Digital Forensics Analysts
Information Security Analysts
Intelligence Analysts
Penetration Testers