Sep 21, 2023  
2021-2022 College Catalog 
2021-2022 College Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CIS 228 - Fundamentals of Network Security

3 Credits, 4 Contact Hours
2 lecture periods 2 lab periods

Introduction and general overview of security measures for computer networks. Includes authentication methods and techniques; attacks and malicious code; remote access concepts; email and web security; directory and file transfer services; and wireless protocols and security. Also includes hardware devices; topologies and security; methods of intrusion detection; establishing security baselines; introduction to cryptography; disaster recovery policies and procedures; and forensics, risk management, and auditing measures.

Prerequisite(s): CIS 119  
Information: This course may help in the preparation for the CompTIA Security+ Exam.
  button image Prior Learning and link to PLA webpage

Course Learning Outcomes
  1. Evaluate methods to detect indicators of compromise.
  2. Apply common security tools.
  3. Interpret vulnerability scans and penetration testing results.
  4. Summarize risk management best practices.
  5. Assess the risk of security designs.

  I.         Threats and Vulnerabilities

A.         Indicators of compromise

B.         Types of attacks

C.         Threat actors

D.         Penetration testing 

E.         Vulnerability scanning

 II.         Technologies and Tools

A.         Common hardware and software network security tools

B.         Security assessment

C.         Implement secure protocols

III.         Architecture and Design

A.         Industry standards, framework and reference architectures

B.         Network architecture security

C.         Secure systems design

D.         Embedded systems

E.         Application and development concepts

F.         Cloud and virtualization security

G.         Physical security controls

IV.         Identity and Access Management

A.         Concepts

B.         Services

C.         Controls

D.         Account management

V.         Risk Management

A.         Policies, plans and procedures

B.         Business impact analysis

C.         Risk management processes and concepts

D.         Incident response

E.         Disaster recovery and business continuity

VI.         Cryptography and PKI

A.         Cryptography concepts

B.         Common algorithms

C.         Wireless security settings

D.         Public key infrastructure (PKI)

Effective Term:
Fall 2021

Add to Portfolio (opens a new window)