Nov 21, 2024  
2023-2024 Workforce Catalog 
    
2023-2024 Workforce Catalog [ARCHIVED CATALOG]

UCIS 228A - Fundamentals of Network Security


Introduction and general overview of security measures for computer networks.  Includes authentication methods and techniques; attacks and malicious code; remote access concepts; email and web security; directory and file transfer services; and wireless protocols and security.  Also includes hardware devices; topologies and security; methods of intrusion detection; establishing security baselines; introduction to cryptography; disaster recovery policies and procedures; and forensics, risk management, and auditing measures. 

  button image Prior Learning and link to PLA webpage

Course Learning Outcomes:
1. Develop techniques to creating/storing usernames and passwords.
2. Explain the methods used for digital signatures, certificates, and tokens.
3. Discuss code and techniques used in network attacks.
4. Describe vulnerability in email, web tools, and software.
5. Identify remote access methods and vulnerability.
6. Develop LDAP and File Transfer Protocols.
7. Explain wireless protocols and security.
8. Design and evaluate secure network topologies.
9. Evaluate methods of intrusion detection.
10. Explain the logic underlying basic cryptography algorithms.
11. Assess the risk of security designs.
Outline:
  • Threats and Vulnerabilities
    • Indicators of compromise
    • Types of attacks
    • Threat actors
    • Penetration testing 
    • Vulnerability scanning
  • Technologies and Tools
    • Common hardware and software network security tools
    • Security assessment
    • Implement secure protocols
  • Architecture and Design
    • Industry standards, framework and reference architectures
    • Network architecture security
    • Secure systems design
    • Embedded systems
    • Application and development concepts
    • Cloud and virtualization security
    • Physical security controls
  • Identity and Access Management
    • Concepts
    • Services
    • Controls
    • Account management
  • Risk Management
    • Policies, plans and procedures
    • Business impact analysis
    • Risk management processes and concepts
    • Incident response
    • Disaster recovery and business continuity
  • Cryptography and PKI
    • Cryptography concepts
    • Common algorithms
    • Wireless security settings
    • Public key infrastructure (PKI)