NWCCD 2018-19 Catalog 
    
    Nov 22, 2024  
NWCCD 2018-19 Catalog [This is an Archived Catalog.]

Add to Portfolio (opens a new window)

CSEC 1520 - Network Defense and Countermeasures


This course is designed to prepare students to think like a hacker and further understand how attackers compromise networks. The course prepares students to conduct test attacks to discover vulnerabilities before attackers do. Students use Kali Linux, a security-testing application for hand-on activities. The goal of the course is to develop a structured approach to conducting a security test.  Additionally, students are introduced to the availability of professional certifications in this field.

Credits: 3

Instructional Method Lecture/Lab

Prerequisites:
Successful completion of COSC 2020 Linux Fundamentals and CSEC 1500 Computer Network Security +, or instructor consent.

Minimum Student Competencies
Upon completion of CSEC 1520 Network Defense and Countermeasures, the student will:

  1. describe the role of security and penetration testers.
  2. summarize what an ethical hacker can and cannot do legally.
  3. discuss types of attacks to computers, network and physical security.
  4. explain how foot-printing methods are used as part of an attacker’s reconnaissance phase.
  5. illustrate port scanning and ping sweeps.
  6. describe steps for enumerating operating systems such as Windows and Linux.
  7. outline programming concepts useful in network and computer security work.
  8. utilize shell scripting tips to automated security tasks.
  9. review vulnerabilities in Windows and Linux operating systems.
  10. evaluate best practices for hardening these systems.
  11. discuss vulnerabilities and best practices for protecting embedded operating systems.
  12. describe web applications vulnerabilities and the tools used to attack web servers.
  13. outline wireless networking hacking tools and countermeasures.
  14. describe attacks to crypto and other access protection systems.
  15. describe devices that can be employed to protect networks.
  16. identify laws affecting network security.




Add to Portfolio (opens a new window)