This course focuses on evaluating network and Internet cybersecurity
issues, designing, implementing successful security policies and firewall
strategies, exposing the system and network vulnerabilities, and defending
against them. Topics include network protocols, network attacks, intrusion
detection systems, packet filtering, and proxy servers, Bastion host and
honey pots, hardening routers, hardening security, E-Mail security, virtual
private networks, and creating fault tolerance.
-
Course Learning Outcomes
- Understand fundamental networking concepts, analyze networking protocols, and implement established standards to design a robust networking infrastructure
- » Assess potential vulnerabilities and threats to network infrastructure, predict the implication of network security breaches, and analyze the available countermeasures.
- » Examine different network cybersecurity mechanisms, analyze available security controls, and develop strategies to implement and configure these controls.
- » Evaluate the role of network security policies and develop comprehensive policies that help in protecting network infrastructure.
- Describe the working of various networking devices and develop strategies for the secure configuration of these devices.
- » Identify security issues with operating systems and network-based applications, analyze the common vulnerabilities, and implement best practices to harden networks.
- » Analyze cryptography algorithms and encryption techniques and design implementation strategies for privacy and security of information
- Compare and contrast various network security tools and make decisions to deploy proper security tools based on evidence, information, and research
- Evaluatephysicalsecuritymechanisms,examinethe issues, and recommend the countermeasures to safeguard the network infrastructure.
- Examine the impact of an incident in the network and develop policies, processes, and guidelines for incident handling and disaster recovery.
0.0
0 total
5
4
3
2
1