Oct 15, 2018
CSEC 1520 - Network Defense and Countermeasures
This course is designed to prepare students to think like a hacker and further understand how attackers compromise networks. The course prepares students to conduct test attacks to discover vulnerabilities before attackers do. Students use Kali Linux, a security-testing application for hand-on activities. The goal of the course is to develop a structured approach to conducting a security test. Additionally, students are introduced to the availability of professional certifications in this field.
Instructional Method Lecture/Lab
Successful completion of COSC 2020 Linux Fundamentals and CSEC 1500 Computer Network Security +, or instructor consent.
Minimum Student Competencies
Upon completion of CSEC 1520 Network Defense and Countermeasures, the student will:
- describe the role of security and penetration testers.
- summarize what an ethical hacker can and cannot do legally.
- discuss types of attacks to computers, network and physical security.
- explain how foot-printing methods are used as part of an attacker’s reconnaissance phase.
- illustrate port scanning and ping sweeps.
- describe steps for enumerating operating systems such as Windows and Linux.
- outline programming concepts useful in network and computer security work.
- utilize shell scripting tips to automated security tasks.
- review vulnerabilities in Windows and Linux operating systems.
- evaluate best practices for hardening these systems.
- discuss vulnerabilities and best practices for protecting embedded operating systems.
- describe web applications vulnerabilities and the tools used to attack web servers.
- outline wireless networking hacking tools and countermeasures.
- describe attacks to crypto and other access protection systems.
- describe devices that can be employed to protect networks.
- identify laws affecting network security.
[Add to Portfolio]