The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
Northern Wyoming Community College District    
NWCCD 2017-18 Catalog 
  Jan 22, 2018
NWCCD 2017-18 Catalog
[Add to Portfolio]

CSEC 1520 - Network Defense and Countermeasures

This course is designed to prepare students to think like a hacker and further understand how attackers compromise networks. The course prepares students to conduct test attacks to discover vulnerabilities before attackers do. Students use Kali Linux, a security-testing application for hand-on activities. The goal of the course is to develop a structured approach to conducting a security test.  Additionally, students are introduced to the availability of professional certifications in this field.

Successful completion of COSC 2020 Linux Fundamentals and CSEC 1500 Computer Network Security +, or instructor consent.

Minimum Student Competencies
Upon completion of CSEC 1520 Network Defense and Countermeasures, the student will:

  1. describe the role of security and penetration testers.
  2. summarize what an ethical hacker can and cannot do legally.
  3. discuss types of attacks to computers, network and physical security.
  4. explain how foot-printing methods are used as part of an attacker’s reconnaissance phase.
  5. illustrate port scanning and ping sweeps.
  6. describe steps for enumerating operating systems such as Windows and Linux.
  7. outline programming concepts useful in network and computer security work.
  8. utilize shell scripting tips to automated security tasks.
  9. review vulnerabilities in Windows and Linux operating systems.
  10. evaluate best practices for hardening these systems.
  11. discuss vulnerabilities and best practices for protecting embedded operating systems.
  12. describe web applications vulnerabilities and the tools used to attack web servers.
  13. outline wireless networking hacking tools and countermeasures.
  14. describe attacks to crypto and other access protection systems.
  15. describe devices that can be employed to protect networks.
  16. identify laws affecting network security.

Credits: 3

Instructional Method Lecture/Lab

Contact Hours: 4.5 hours/week

[Add to Portfolio]