Students successfully completing this program will understand and perform task related to threat management such as phishing, social media profiling, network mapping, packet capture, firewalls, email harvesting. Response and countermeasures includes but not limited to Network segmentation, jump box, Honeypot, MAC, network access control, endpoint security, hardening, group policies, penetration testing, training and exercises, reverse engineering, risk evaluation, Vulnerability management, remediation, regulatory environment and regulations. Data classifications, cyber threat response, threat classification, forensic kits. Write Phyton statement, create application, processing data types, integers, strings, writing conditional statements and loops in phyton. Structing code for reuse, writing code to process files and directories, handling exceptions.