Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


Network And Cloud Security (CSC-282)


Semester: Fall 2024
Number: 0145-282-001
Instructor: Kees Leune
Days: Monday Wednesday 9:25 am - 10:40 am
Note: Traditional In-Person Class
Location: Garden City - Swirbul Library GALL
Credits: 3
Course Materials: View Text Books
Description:

After completing this course, students will learn to analyze and design defensible network architectures. Students will explore TCP/IP and HTTP and investigate the role of cryptography in network security. Students will study intrusion detection/prevention technologies and firewalls. We explore the impact of cloud adoption of traditional defense models.

Learning Goals:   After completing this course, students will be able to:O1: Analyze and design a defensible network architectureO2: Name and explain the layers in the TCP/IP modelO3: Explain how HTTP worksO4: Explain how intrusion detection/prevention technologies can be used and develop custom rules to alert on specific types of network trafficO5: Explain the impact of cryptography on network securityO6: Conduct network scans using port scanners and vulnerability scannersO7: Use network capture tools to intercept network trafficO8: Explain the impact on cybersecurity of the transition from on-premise to cloud-based computing

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

Prerequisites:

» View Other Sections of this Course


« Back to Search Results

 
Apply Now
Request Information