Courses may be offered in one of the following modalities:
If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.
Semester: | Fall 2024 |
Number: | 0145-282-001 |
Instructor: | Kees Leune |
Days: | Monday Wednesday 9:25 am - 10:40 am |
Note: | Traditional In-Person Class |
Location: | Garden City - Swirbul Library GALL |
Credits: | 3 |
Course Materials: | View Text Books |
Description: |
After completing this course, students will learn to analyze and design defensible network architectures. Students will explore TCP/IP and HTTP and investigate the role of cryptography in network security. Students will study intrusion detection/prevention technologies and firewalls. We explore the impact of cloud adoption of traditional defense models. |
Learning Goals: |
After completing this course, students will be able to:O1: Analyze and design a defensible network architectureO2: Name and explain the layers in the TCP/IP modelO3: Explain how HTTP worksO4: Explain how intrusion detection/prevention technologies can be used and develop custom rules to alert on specific types of network trafficO5: Explain the impact of cryptography on network securityO6: Conduct network scans using port scanners and vulnerability scannersO7: Use network capture tools to intercept network trafficO8: Explain the impact on cybersecurity of the transition from on-premise to cloud-based computing *The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here. |
Prerequisites: |
» View Other Sections of this Course