This course covers topics related to administration of network security. Topics include a survey of encryption and authentication algorithms; threats to security; operating system security; IP security; user authentication schemes; web security; email security protocols; intrusion detections; viruses; firewalls; Virtual Private Networks; network management and security policies and procedures. Laboratory projects are assigned as part of the homework requirements.
Define, distinguish among and classify examples of threats, vulnerabilities, and countermeasures.
Identify and describe interception, interruption, modification, and fabrication
Define, distinguish among, and describe confidentiality, integrity, and availability.
Define, distinguish among, and classify examples of method, opportunity, and motive
Describe the different types of people that attack systems, and their motivations.
Describe and give examples of the following kinds of countermeasures: encryption, software controls, hardware controls, policies and procedures, and physical.
Describe the principles behind symmetric and asymmetric cryptosystems and provide examples of symmetric systems in common use.
Compare and contrast symmetric and asymmetric cryptosystems, and provide examples of situations where one would be preferable to the other.
Define and describe substitution and transposition as they apply to cryptography.
Describe the concept of “defense-in-depth
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.