This course covers topics related to administration of network security. Topics include a survey of encryption and authentication algorithms; threats to security; operating system security; IP security; user authentication schemes; web security; email security protocols; intrusion detections; viruses; firewalls; Virtual Private Networks; network management and security policies and procedures. Laboratory projects are assigned as part of the homework requirements.
- Define, distinguish among and classify examples of threats, vulnerabilities, and countermeasures.
- Identify and describe interception, interruption, modification, and fabrication
- Define, distinguish among, and describe confidentiality, integrity, and availability.
- Define, distinguish among, and classify examples of method, opportunity, and motive
- Describe the different types of people that attack systems, and their motivations.
- Describe and give examples of the following kinds of countermeasures: encryption, software controls, hardware controls, policies and procedures, and physical.
- Describe the principles behind symmetric and asymmetric cryptosystems and provide examples of symmetric systems in common use.
- Compare and contrast symmetric and asymmetric cryptosystems, and provide examples of situations where one would be preferable to the other.
- Define and describe substitution and transposition as they apply to cryptography.
- Describe the concept of “defense-in-depth
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.