National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led
Course Description

This course covers topics related to administration of network security. Topics include a survey of encryption and authentication algorithms; threats to security; operating system security; IP security; user authentication schemes; web security; email security protocols; intrusion detections; viruses; firewalls; Virtual Private Networks; network management and security policies and procedures. Laboratory projects are assigned as part of the homework requirements.

Learning Objectives

  • Define, distinguish among and classify examples of threats, vulnerabilities, and countermeasures.
  • Identify and describe interception, interruption, modification, and fabrication
  • Define, distinguish among, and describe confidentiality, integrity, and availability.
  • Define, distinguish among, and classify examples of method, opportunity, and motive
  • Describe the different types of people that attack systems, and their motivations.
  • Describe and give examples of the following kinds of countermeasures: encryption, software controls, hardware controls, policies and procedures, and physical.
  • Describe the principles behind symmetric and asymmetric cryptosystems and provide examples of symmetric systems in common use.
  • Compare and contrast symmetric and asymmetric cryptosystems, and provide examples of situations where one would be preferable to the other.
  • Define and describe substitution and transposition as they apply to cryptography.
  • Describe the concept of “defense-in-depth

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.