Through guided discussion and hands-on assignments, students will explore various cyber security attack techniques, defense mechanisms and best practices. Upon successful completion of this course students should have the knowledge to:

  • Understand major cryptographic systems and how they are used within network security
  • Understand email phishing, social engineering, malware, worm and common detection mechanisms
  • Identify different types of access control and site security methods
  • Demonstrate knowledge of intrusion detection process and implement open-source intrusion detection systems (IDS)
  • Demonstrate ability to design, implement, and maintain network firewall systems
  • Understand various attack methods used to target and exploit computer network systems
  • Demonstrate ability to successfully detect and counter various hacks and exploits on computer network systems
  • Demonstrate ability to perform risk analysis and risk management

About Author

Back to top