|
Dec 22, 2024
|
|
|
|
SE 4940 - Network Security Tools and Practices2 lecture hours 2 lab hours 3 credits Course Description This course introduces students to cybersecurity through the application of tools and practices used in real-world network security analyses. Students learn the history of securing computer networks and the evolution of threats from hackers to sophisticated criminal organizations. Proactive security measures including authentication, encryption and firewalls are introduced. Students are given the opportunity to securely configure both wired and wireless networks. Monitoring technologies including intrusion detection, packet sniffing and computer/network forensics approaches are discussed and applied. Lab exercises focus on the application of tools in a live network environment to achieve best practices in network security. (prereq: CS 2911 or CE 4961 , CS 3840 or CS 3841 ) Course Learning Outcomes Upon successful completion of this course, the student will be able to:
- Assess and evaluate network security tools for use in defending, attacking and testing computer networks
- Design a threat scenario and implement defenses to mitigate potential attacks
- Perform a penetration test of a live network and assess the results
- Discuss the legal and ethical issues involved with assessing and testing a network for vulnerabilities and weaknesses
- Explain the challenges of securing a wireless network
- Explain through case studies the ethical, technological, and legal impact of large scale botnets
Prerequisites by Topic
- Network protocol fundamentals (ISO Network Stack, Hubs, switches, and routers, DHCP Protocol Operation, TCP/IP and UDP, DNS Operation, LAN vs WAN vs MAN)
- Ethernet frames
- Linux shell scripting and basic commands, such as ping, tracert, ipconfig/ifconfig
- Virtual machine usage and operation including installing a VM and bridged versus NAT connections.
Laboratory Topics
- Basic network traffic analysis
- Network enumeration
- Encryption and tunneling
- Rogue wireless system detection
- Vulnerability assessment of network resources
- Setting up wireless systems
- Wireless site surveying
- Detecting intrusions
- Final project penetration test of controlled class network topology
Coordinator Dr. Walter Schilling
Add to Portfolio (opens a new window)
|
|