This course will build on foundational networking concepts, with particular attention to vulnerabilities within protocol design, analyzing current technologies used to protect networks. Defense in depth and defense in breadth strategies will be considered as well as how best to design a solution based on the business requirements and the assets that need to be protected. The course covers defense strategies, as well as detection and the monitoring and analysis requirements for those strategies to be effective.
- Develop network designs that implement appropriate security mechanisms based on data classifications and priorities
- Evaluate existing network designs for potential security concerns and provide recommendations for improvements
- Explain the importance and application of defense in breadth and defense in depth in the context of a system and network design
- Interpret network protocol specifications to find potential areas of security concerns