Jun 22, 2024  
2023-2024 College Catalog 
2023-2024 College Catalog [ARCHIVED CATALOG]

CIS 228 - Fundamentals of Network Security

3 Credits, 4 Contact Hours
2 lecture periods 2 lab periods

Introduction and general overview of security measures for computer networks. Includes authentication methods and techniques; attacks and malicious code; remote access concepts; email and web security; directory and file transfer services; and wireless protocols and security. Also includes hardware devices; topologies and security; methods of intrusion detection; establishing security baselines; introduction to cryptography; disaster recovery policies and procedures; and forensics, risk management, and auditing measures.

Prerequisite(s): CIS 119  
Information: This course may help in the preparation for the CompTIA Security+ Exam.
Gen-Ed: Meets AGEC Options requirement; Meets CTE - Options requirement

Button linking to AZ Transfer course equivalency guide    button image Prior Learning and link to PLA webpage

Course Learning Outcomes
  1. Analyze common security failures and identify specific design principles that have been violated.
  2. Understand the interaction between security and system usability
  3. Describe which cryptographic protocols and algorithms are appropriate for a given situation.
  4. Evaluate how network operational procedures and procedures relate to network security.
  5. Explain how to utilize Federal, State and Local Cyber Defense partners/structures.

  1. Threats and Vulnerabilities
    1. Indicators of compromise
    2. Types of attacks
    3. Threat actors
    4. Penetration testing 
    5. Vulnerability scanning
  2. Technologies and Tools
    1. Common hardware and software network security tools
    2. Security assessment
    3. Implement secure protocols
  3. Architecture and Design
    1. Industry standards, framework and reference architectures
    2. Network architecture security
    3. Secure systems design
    4. Embedded systems
    5. Application and development concepts
    6. Cloud and virtualization security
    7. Physical security controls
  4. Identity and Access Management
    1. Concepts
    2. Services
    3. Controls
    4. Account management
  5. Risk Management
    1. Policies, plans and procedures
    2. Business impact analysis
    3. Risk management processes and concepts
    4. Incident response
    5. Disaster recovery and business continuity
  6. Cryptography and PKI
    1. Cryptography concepts
    2. Common algorithms
    3. Wireless security settings
    4. Public key infrastructure (PKI)

Effective Term:
Fall 2023