System and Network Security, IT 448
About this Course:
Prepares students for a role as a network security analyst and administrator. Topics include hacking, vulnerabilities, and countermeasures; network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A key component of this course is a self-contained team project.
This course is part 1 of a two course sequence in computer and network security including firewalls, routing, encryption, filesystems, network viruses and attacks, including prevention. Students will complete a group security project they can choose to continue researching in part 2 of this course sequence
IT 440 Network+ Certification Training , OSI model networking and protocol concepts or equivalent experience required for enrollment.
Introduction to security:
history and taxonomy of incidents, costs involved in lack of good security, high-level axioms and goals regarding security.
Review of the Internet and OS:
review of Internet organization and its key protocols, organization of operating systems and network interfaces, research on aspects of the Internet and OS vulnerability.
Guide to Understanding Intrusion:
detailed investigation of the methods and tools that hackers use to intrude and launch incidents, communication subnet and application attacks, research into various attack scenarios.
extensive investigations of technologies used to secure computer systems and networks, symmetric and asymmetric encryption, encryption protocols, key management and support, firewalls and filters, DMZs, VPNs, and IDSs.
The Human Element:
employee trust, organizational changes needed to achieve secure systems and networks, training.
Architecting, Practical Implementation and Testing:
design of secure systems from small office to large corporation, risk assessment, organizational policy, system availability and reliability, attempts to compromise secure networks and hosts.
Legal and International Issues - Future Trends:
national and international laws racing to keep up, history and issues regarding legal aspects of security, examination of the evolution of technology and computer and network violations.