NWCCD 2020-21 Catalog 
    Apr 01, 2023  
NWCCD 2020-21 Catalog [This is an Archived Catalog.]

Add to Portfolio (opens a new window)

CSEC 1520 - Network Defense and Countermeasures

This course is designed to prepare students to think like a hacker and further understand how attackers compromise networks. The course prepares students to conduct test attacks to discover vulnerabilities before attackers do. Students use Kali Linux, a security-testing application for hand-on activities. The goal of the course is to develop a structured approach to conducting a security test.  Additionally, students are introduced to the availability of professional certifications in this field.

Credits: 3

Instructional Method Lecture/Lab

Successful completion of COSC 2020 Linux Fundamentals and CSEC 1500 Computer Network Security +, or instructor consent.

Minimum Student Competencies
Upon completion of CSEC 1520 Network Defense and Countermeasures, the student will:

  1. describe the role of security and penetration testers.
  2. summarize what an ethical hacker can and cannot do legally.
  3. discuss types of attacks to computers, network and physical security.
  4. explain how foot-printing methods are used as part of an attacker’s reconnaissance phase.
  5. illustrate port scanning and ping sweeps.
  6. describe steps for enumerating operating systems such as Windows and Linux.
  7. outline programming concepts useful in network and computer security work.
  8. utilize shell scripting tips to automated security tasks.
  9. review vulnerabilities in Windows and Linux operating systems.
  10. evaluate best practices for hardening these systems.
  11. discuss vulnerabilities and best practices for protecting embedded operating systems.
  12. describe web applications vulnerabilities and the tools used to attack web servers.
  13. outline wireless networking hacking tools and countermeasures.
  14. describe attacks to crypto and other access protection systems.
  15. describe devices that can be employed to protect networks.
  16. identify laws affecting network security.

Add to Portfolio (opens a new window)