The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
Northern Wyoming Community College District    
NWCCD 2017-18 Catalog 
  Feb 18, 2018
NWCCD 2017-18 Catalog
[Add to Portfolio]

CSEC 1500 - Computer Network Security+

This course gives the student foundation-level computer and network security skills and knowledge. The course maps to the TestOut Security Pro and Comp TIA Security+ Certification and covers all core domains including systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security.


Minimum Student Competencies
Upon completion of CSEC 1500 Computer Network Security+, the student will:

  1. differentiate between various system security threats.
  2. apply industry best practices for identity and access control methods.
  3. differentiate general cryptography concepts.
  4. apply basic encryption concepts to appropriate applications.
  5. develop security policies and incident response processes.
  6. implement the appropriate network tools and procedures to facilitate network security.
  7. outline effective physical security risk mitigation practices.
  8. list network perimeter defense practices.
  9. detail common network attacks and methods of risk mitigation.
  10. state operating system hardening procedures to achieve workstation and server security.
  11. define application development secure coding lifecycle.
  12. explain applications vulnerabilities and appropriate countermeasures.
  13. describe data security issues and methods of protection.
  14. evaluate vulnerability assessments and audits using common industry tools.

Credits: 3

Instructional Method Lecture/Lab

Contact Hours: 4.5 hours/week

[Add to Portfolio]