Apr 23, 2024  
2015-2016 Undergraduate Academic Catalog 
    
2015-2016 Undergraduate Academic Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

SE 4940 - Network Security Tools and Practices

2 lecture hours 2 lab hours 3 credits
Course Description
This course introduces students to the dynamic field of network security through the application of tools and practices commonly used in real-world network environments. Students learn the history of securing computer networks and the evolution of threats from hackers to sophisticated criminal organizations. Proactive security measures including authentication, encryption and firewalls are introduced. Monitoring technologies including intrusion detection, packet sniffing and computer/network forensics approaches are discussed and applied. Specific threats including network worms, phishing attacks, malware (viruses, spyware, rootkits, etc.), and denial of service are analyzed, along with prevention or recovery solutions. Lab and homework exercises focus on the application of tools in a live network environment to achieve best practices in network security. (prereq: CS 2910  or CE 4960 , familiarity with Linux)
Course Learning Outcomes
Upon successful completion of this course, the student will be able to:
  • Assess and evaluate network security tools for use in defending, attacking and testing computer networks.
  • Design a threat scenario and implement defenses to mitigate potential attacks.
  • Perform a penetration test of a live network and assess the results.
  • Discuss the legal and ethical issues involved with assessing and testing a network for vulnerabilities and weaknesses.
  • Discuss the roles and responsibilities of network security professionals.

Prerequisites by Topic
  • Network protocol basics
  • Linux shell and basic commands

Course Topics
  • Network security essentials
  • Network reconnaissance and fingerprinting
  • Network defense best practices
  • Network exploits and denial of service attacks
  • Malware taxonomy and case studies
  • Intrusion detection and response
  • Network penetration testing
  • Case studies of network security breaches

Laboratory Topics
  • Network reconnaissance and packet sniffing tool
  • Vulnerability assessment of network resources
  • Use of exploit tools against controlled test systems
  • Final project penetration test of controlled class network topology

Coordinator
Josiah Yoder



Add to Portfolio (opens a new window)