Apr 18, 2024  
2018-2019 Undergraduate Academic Catalog 
    
2018-2019 Undergraduate Academic Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

SE 4940 - Network Security Tools and Practices

2 lecture hours 2 lab hours 3 credits
Course Description
This course introduces students to cybersecurity through the application of tools and practices used in real-world network security analyses. Students learn the history of securing computer networks and the evolution of threats from hackers to sophisticated criminal organizations. Proactive security measures including authentication, encryption and firewalls are introduced. Students are given the opportunity to securely configure both wired and wireless networks.  Monitoring technologies including intrusion detection, packet sniffing and computer/network forensics approaches are discussed and applied. Lab exercises focus on the application of tools in a live network environment to achieve best practices in network security. (prereq: CS 2911  or CE 4961 , CS 3840  or CS 3841 )
Course Learning Outcomes
Upon successful completion of this course, the student will be able to:
  • Assess and evaluate network security tools for use in defending, attacking and testing computer networks
  • Design a threat scenario and implement defenses to mitigate potential attacks
  • Perform a penetration test of a live network and assess the results
  • Discuss the legal and ethical issues involved with assessing and testing a network for vulnerabilities and weaknesses
  • Explain the challenges of securing a wireless network
  • Explain through case studies the ethical, technological, and legal impact of large scale botnets

Prerequisites by Topic
  • Network protocol fundimentals (ISO Network Stack, Hubs, switches, and routers, DHCP Protocol Operation, TCP/IP and UDP, DNS Operation, LAN vs WAN vs MAN)
  • Ethernet Frames
  • Linux shell scripting and basic commands, such as ping, tracert, ipconfig/ifconfig
  • Virtual machine usage and operation including installing a VM and bridged versus NAT connections.

Laboratory Topics
  • Basic network traffic analysis
  • Network enumeration
  • Encryption and tunneling
  • Rogue wireless system detection
  • Vulnerability assessment of network resources
  • Setting up Wirless Systems
  • Wireless site surveying
  • Detecting intrusions
  • Final project penetration test of controlled class network topology

Coordinator
Walter Schilling



Add to Portfolio (opens a new window)