Through guided discussion and hands-on assignments, students will explore various cyber security attack techniques, defense mechanisms and best practices. Upon successful completion of this course students should have the knowledge to:
- Understand major cryptographic systems and how they are used within network security
- Understand email phishing, social engineering, malware, worm and common detection mechanisms
- Identify different types of access control and site security methods
- Demonstrate knowledge of intrusion detection process and implement open-source intrusion detection systems (IDS)
- Demonstrate ability to design, implement, and maintain network firewall systems
- Understand various attack methods used to target and exploit computer network systems
- Demonstrate ability to successfully detect and counter various hacks and exploits on computer network systems
- Demonstrate ability to perform risk analysis and risk management