![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course covers the following learning outcomes and goals: understanding the current landscape of cybersecurity, exploring the relationship between government agencies and cybersecurity, learning about the Federal Acquisition Regulation (FAR) and its implications, delving into hacking techniques, and examining the concept of cyber terrorism.
Individual skills or tools taught in this course include knowledge of cybersecurity practices, strategies for engaging with government agencies, understanding the FAR and its modifications, insights into hacking methods, and awareness of cyber terrorism threats.
The teaching method of this course involves presentations and discussions led by industry experts from Aspect Ventures, Kaseware, OutsideIntel, and POLITICO.
The intended audience for this course includes individuals interested in cybersecurity, government agencies, professionals working in the tech industry, and anyone concerned about cyber threats and terrorism.
Syllabus
Introduction
What do government agencies know about cybersecurity
How to deal with the government
The FAR
Changing the FAR
Hacking
Cyber terrorism
Taught by
Collision Conference