|
Dec 22, 2024
|
|
|
|
CSN 3020 - Security Fundamentals
Clock Hours: 193
Delivery Mode on-ground
Prerequisites: Completion of 1st and 2nd Trimester
Industry Certifications CompTIA Security+ Certification
Course Description: This course is designed to educate students about various computer attacks; including, worms, Trojans, spoofing attacks to name a few. In addition to learning the various types, students are taught how to combat and protect against the attacks or rid a computer of infected items.
Student Learning Outcomes:
-
Understand network security; including, security threat trends and their ramification, the goals, and the factors involved in a secure network strategy.
-
Explain denial-of-service (DOS) attacks, the major components used in DOS attacks and how they are installed.
-
Explain and discuss ping-of-death, man-in-the-middle, replay, and TCP session hijacking attacks.
-
Understand the major types of spoofing attacks.
-
Detail three types of social-engineering attacks.
-
List the major types of attacks used against encrypted data.
-
List the major types of malicious software and identify a counter measure for each one.
-
Understand the implications of IEEE 802.1x and how it is used.
-
Understand VPN technology and its uses for securing remote access to networks.
-
Understand how RADIUS authentication works.
-
Understand how TACACS+ operates.
-
Understand how PPTP, L2TP, SSH, and IPSec work and when they are used.
-
Understand the vulnerabilities associated with telecommuting.
-
Understand the need for secure email, email vulnerabilities, and how to safeguard against them.
-
Outline the benefits of PGP and S/MIME.
-
Understand SSL/TLS protocols and their implementation on the Internet and the HTTPS protocol as it relates to SSL.
-
Understand the vulnerabilities of JavaScript, buffer overflow, ActiveX, cookies, CGI, applets, SMTP relay, and how they are commonly exploited.
-
Identify the vulnerabilities of the FTP method of exchanging data then discuss the alternative to FTP, S/FTP in order to better secure your network infrastructure.
-
Understand security issues related to wireless data transfer; including the 802.11x standards, Wireless Application Protocol (WAP), Wireless Transport Layer Security (WTLS) protocol, and Wired Equivalent Privacy (WEP.
-
Understand the purpose of a network firewall.
-
Understand the role of routers, switches, or other networking hardware in security.
|
|