Practitioner - Logistics
Program Overview
The Bisk Amplified program is meticulously designed to provide a comprehensive educational experience that caters to the diverse needs of students aiming to advance their careers. This program offers detailed course information that covers a wide array of subjects, ensuring that each participant gains in-depth knowledge and practical skills applicable to their field. The curriculum is structured to include both theoretical foundations and hands-on learning opportunities, fostering a robust understanding of the material. Courses are taught by experienced instructors who bring real-world expertise to the classroom, enhancing the learning experience and providing students with valuable insights into industry practices.
One of the standout features of the Bisk Amplified program is its focus on student benefits. From personalized academic advising to extensive career support services, the program is dedicated to ensuring that students are well-prepared for their professional journeys. Participants have access to a wealth of resources, including online libraries, study groups, and interactive learning platforms that facilitate collaboration and engagement. Additionally, the program offers flexible scheduling options, allowing students to balance their studies with personal and professional commitments.
Graduates of the Bisk Amplified program often find themselves equipped with the skills and confidence needed to excel in their careers. The program’s emphasis on practical application, combined with its supportive learning environment, makes it a top choice for those seeking to enhance their educational and professional prospects. By enrolling in Bisk Amplified, students invest in a future where they can achieve their full potential, backed by a program that prioritizes detailed course content and substantial student benefits.
Program Type
Micro-Credential
Program Format
Online
Instruction Format
Instructor Led
Courses
1 course
Duration
4 Months
Next Start
Flexible Start Dates
Program Overview
An 8-course intermediary, progressively challenging, program where the student will be expected to use virtual labs to go over cybersecurity techniques, the usage of various applications, as well as a more in-depth view of Cyber Threats and how to identify them.
What You'll Learn
- Moderate knowledge on cybersecurity threats, attacks, vulnerabilities
- Network traffic
- Blockchain
- Cloud security
Admission Requirements
- 18 years of age or older
Curriculum & Tuition
Required Courses
Tuition
Average Cost Per Course: $3,999
Curriculum Details
Sample courses include:
• Cloud Foundations: Students will be exposed to the current practices in cloud computing. Topics may include cloud service models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), technologies supporting cloud computing such as virtualization, motivating factors, benefits and challenges of the cloud, cloud storage, performance and systems issues, disaster recovery, federated clouds, data centers, and cloud security. Students will be exposed to a leading public cloud computing platform.
• Blockchain: This course will be an introduction to Blockchain. There will be a modularized approach, to focus development on the skills for each aspect of blockchain. Labs based on practical applications e.g. bitcoins are incorporated.
• Data Mining: This module provides an overview of basic concepts in data mining and main methodologies and approaches used for knowledge discovery from data. Topics include the definition of data mining field; data mining process; data preprocessing; predictive and descriptive data mining; evaluation of data mining models; and privacy and security of data. The?module?uses?case studies?from healthcare.
• Cognitive Computing: This module provides lectures and labs on deep learning and machine learning using combination of tools such as cognitive services APIs, Deep Learning frameworks and libraries. Two major breakthroughs for cognitive computing in healthcare are: 1) consumer/user engagement (e.g.example IBM Watson social network Welltok) and 2) discovery applications, such as drug discovery and analysis of human health. Internet of Medical Things integrates sensors and AI algorithms, which are vulnerable to cyber-attacks. Examples of attacks are: 1) access by malicious actors; 2) loss or corruption of enterprise information and patent data. Topics include: Neural Networks, Convolutional Neural Network (CNN), Long – Short Term Memory (LSTM), Natural Language Processing (NLP) and Deep Reinforcement Learning (Deep RL).
• Information Security: This module is designed to give students a basic competency in the principles of information security and how they relate to computing systems, particularly at the level of the operating system. Key areas of focus include fundamental security design principles, the adversarial model, data security, virtualization, viruses & malware, and operating-system specific information security concepts for both desktop and mobile systems.
• Network Security: The module discusses fundamental concepts and principles of network security. The course covers basic security topics, including networking basics, network traffic signatures, cryptography, wireless networking, wireless security, firewalls, IDPSs, virtual private network, and web security.
• Digital Forensics: This module covers the fundamentals of digital forensics. Topics will include historical issues, key concepts, and tools and techniques of the trade. In addition, reporting methods will be discussed. Various open-source tools will be used in the lab portion of the module.
• Cyber Threat Hunting: This module covers the basics of cyber threat hunting in a secure operations center. Students will learn the mindset of the adversary and methods to identify new and emerging cyber threats in an organizational environment. Topics include log analysis, event correlation, open-source threat intelligence, use of AI in threat identification, honeypots, and threat sharing. Students will practice new skills in a simulated threat environment.
Why Choose Louisville
Founded in 1798, the University of Louisville (UofL) is a vital ecosystem that creates thriving futures for students, community and beyond. Recognized by the Carnegie Foundation as both a Research 1 and a Community Engaged university, UofL is uniquely positioned to impact lives in areas of student success and research and innovation, while dynamic connections with local and global communities provide unparalleled opportunities. Through its approach to education, innovation and connection UofL is committed to shape a better future for all.