Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


Computer And Network Security (CSC-380)


Semester: Spring 2024
Number: 0145-380-001
Instructor: Sung Kim
Days: Monday Wednesday 2:25 pm - 3:40 pm
Note: Traditional In-Person Class
Location: Garden City - Science Building 227
Credits: 3
Status: This Course is Filled to Capacity
Course Materials: View Text Books
Related Syllabi: Kees Leune for Spring 2015*

*Attention Students: Please note that the syllabi available for your view on these pages are for example only. The instructors and requirements for each course are subject to change each semester. If you enroll in a particular course, your instructor and course outline may differ from what is presented here.

Description:

Students study offensive cyber-techniques and defensive strategies. Students will have an intermediate-level understanding of cybersecurity and a basic understanding of methods and techniques for digital forensics. Students will be provided with in-depth methods and techniques used by cyberattackers, which enables students to defend against them.

Learning Goals:   Students will: • Develop an intermediate-level understanding of the methods and techniques used by cyber attackers, and be able to explain how typical cyberattacks progress.• Be able to conduct network scans and vulnerability assessments, and can report on their findings.• Be able to discuss log management and SIEM, and can analyze and interpret large amounts of log data.• Be able to assess web applications and identify common vulnerability categories. In addition, students will be able to suggest remediation strategies.• Be able to conduct a meaningful discussion about digital forensics, and develop skills for acquiring and analyzing digital evidence.

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

Prerequisites:

» View Other Sections of this Course


« Back to Search Results

 
Apply Now
Request Information