Dec 22, 2024  
Course/Program Inventory 
    
Course/Program Inventory

CSN 3020 - Security Fundamentals



Clock Hours: 193

Delivery Mode
on-ground

Prerequisites: Completion of 1st and 2nd Trimester

Industry Certifications CompTIA Security+ Certification 

Course Description:
This course is designed to educate students about various computer attacks; including, worms, Trojans, spoofing attacks to name a few. In addition to learning the various types, students are taught how to combat and protect against the attacks or rid a computer of infected items. 

Student Learning Outcomes:
  1. Understand network security; including, security threat trends and their ramification, the goals, and the factors involved in a secure network strategy. 

  1. Explain denial-of-service (DOS) attacks, the major components used in DOS attacks and how they are installed. 

  1. Explain and discuss ping-of-death, man-in-the-middle, replay, and TCP session hijacking attacks. 

  1. Understand the major types of spoofing attacks. 

  1. Detail three types of social-engineering attacks. 

  1. List the major types of attacks used against encrypted data. 

  1. List the major types of malicious software and identify a counter measure for each one. 

  1. Understand the implications of IEEE 802.1x and how it is used. 

  1. Understand VPN technology and its uses for securing remote access to networks. 

  1. Understand how RADIUS authentication works. 

  1. Understand how TACACS+ operates. 

  1. Understand how PPTP, L2TP, SSH, and IPSec work and when they are used. 

  1. Understand the vulnerabilities associated with telecommuting. 

  1. Understand the need for secure email, email vulnerabilities, and how to safeguard against them. 

  1. Outline the benefits of PGP and S/MIME. 

  1. Understand SSL/TLS protocols and their implementation on the Internet and the HTTPS protocol as it relates to SSL. 

  1. Understand the vulnerabilities of JavaScript, buffer overflow, ActiveX, cookies, CGI, applets, SMTP relay, and how they are commonly exploited. 

  1. Identify the vulnerabilities of the FTP method of exchanging data then discuss the alternative to FTP, S/FTP in order to better secure your network infrastructure. 

  1. Understand security issues related to wireless data transfer; including the 802.11x standards, Wireless Application Protocol (WAP), Wireless Transport Layer Security (WTLS) protocol, and Wired Equivalent Privacy (WEP. 

  1. Understand the purpose of a network firewall. 

  1. Understand the role of routers, switches, or other networking hardware in security.