SWE 4540 - Network Security Tools and Practices

2 lecture hours 2 lab hours 3 credits
Course Description
This course introduces students to cybersecurity through the application of tools and practices used in real-world network security analyses. Students learn the history of securing computer networks and the evolution of threats from hackers to sophisticated criminal organizations. Proactive security measures including authentication, encryption and firewalls are introduced. Students are given the opportunity to securely configure both wired and wireless networks.  Monitoring technologies including intrusion detection, honeypots, packet sniffing and computer/network forensics approaches are discussed and applied. Lab exercises focus on the application of tools in a live network environment to achieve best practices in network security.
Prereq: CSC 3210  (quarter system prereq: CS 3840 or CS 3841)
Note: None
This course meets the following Raider Core CLO Requirement: None
Course Learning Outcomes
Upon successful completion of this course, the student will be able to:
  • Assess and evaluate network security tools for use in defending, attacking, and testing computer networks
  • Design a threat scenario and implement defenses to mitigate potential attacks
  • Perform a penetration test of a live network and assess the results
  • Discuss the legal and ethical issues involved with assessing and testing a network for vulnerabilities and weaknesses
  • Configure a rudimentary network topology in a secure fashion managing APs, VLANs, and other network configuration parameters
  • Explain the weaknesses of Wi-Fi networking from a security standpoint
  • Communicate with the general public about the importance of network security in the home and workplace

Prerequisites by Topic
Operating systems:

  • Linux shell scripting and basic commands
  • Virtual machine usage and operation including installing a VM and bridged versus NAT connections
  • Rudimentary networking (sockets, IP address, port, etc.)

Course Topics
  • Introduction to network security
  • Overview of networking technology and key concepts
  • The basics of network security
  • Network attacks
  • Firewalls and network segregation
  • Network segmentation
  • Firewall implementation
  • Intrusion detection systems and honeypots
  • Virtual private networks
  • Wi-Fi networking technology overview
  • Wi-Fi networking security topics
  • Authentication with networks
  • Ethical issues related to network security and ethical hacking
  • Network security standards and certifications
  • Emerging topics in network security
     

Laboratory Topics
  • Identifying local Wi-Fi networks and local Wi-Fi network security
  • Network mapping and device identification using Kali Linux
  • ARP spoofing and ARP poisoning
  • Configuring a firewall on a network and on a simple server
  • Deploying a honeypot on a network
  • Analyzing network traffic and detecting anomalies with SNORT
  • Setting up a VPN on a network
  • Working with VLANs
  • Packet sniffing an insecure wireless network
  • Attacking a Wi-Fi network using dictionary attacks
  • Attacking a network with a denial of service attack
  • Connecting networks Together
  • IOT device considerations on a network

Coordinator
Dr. Walter Schilling


Print-Friendly Page (opens a new window)