This course addresses concepts and industry standards of computer networking, including the OSI Reference Model, TCP/IP and network routing concepts, as well as inherent risks in their use. Also addressed are digital cryptography principles and practices; major email security standards; and methods by which networks may be attacked. Students use a networking software tool to build a secure network, as well as prepare to assist in incident response and management activities in the event of a network breach.
- Given a network either isolated from other networks or with access to external networks that are not controlled by the organization, analyze the threats from both internal and external sources that the organization's network might be subject to. Describe the vulnerabilities of the network. Describe the attack methods that could be used.
- Given an analysis of the internal and external threats to an organization's network, develop a network security plan to protect the network from these internal and external vulnerabilities and attacks.
- Given a set of encryption methods, analyze and evaluate these so as to select one or more for implementation as part of the network security plan.
- Given the need to conduct e-commerce as part of the overall business plan of an organization, evaluate and select a method to secure the network equipment used for this purpose, as well as the user connections from and to their location.
- Given the need for remote access to a network, analyze, evaluate, and justify the selection of a method to secure these remote access sessions.
- Given a wireless network, develop a security plan to control access to this network.
- Given a common network, using the tools typically used for this, analyze the network's vulnerability to attack from the inside and from the outside of the network.