NET 612 - Fundamentals Network Security Last Date of Approval: Fall 2022
3 Credits Total Lecture Hours: 30 Total Lab Hours: 30 Total Clinical Hours: 0 Total Work-Based Experience Hours: 0
Course Description: This course will portrait things that can go wrong with a computer network and provide a discussion of the tools available to counteract them. This course will walk through a security audit and the process of developing an effective security policy. Students will learn how to implement security measures–including logging, encryption, and packet filtering–on your existing network infrastructure. Course will look at specifics for Unix, Windows, Cisco IOS, and NetWare. This course will help students refine their critical thinking skills as they evaluate various technology topics and concepts while searching for underlying connections between the technology and how to apply those concepts in a lab setting, which is a skill that should be beneficial in any/all types of technology careers. This course will also help students gain hands-on technology literacy which will be of vital significance when making important work-related decisions.
Prerequisites: NET 138 , NET 790 Mode(s) of Instruction: traditional/face-to-face, virtual, and/or online
Credit for Prior Learning: This course offers an opportunity for students to earn Credit for Prior Learning for skills that they have brought with them to Iowa Central. For more information, please ask the instructor and see the Iowa Central Community College catalog.
Course Fees: ebook/Access Code: $119.99 (charged once per term for all courses that use Cengage Unlimited); 8-week online students will have a per credit hour ebook fee automatically charged to their account.
Common Course Assessment(s): None
Student Learning Outcomes and Objectives: Student Learning Outcomes:
a. Communicate information effectively and efficiently using current business-related technologies.
b. Demonstrate personal responsibility skills in a professional setting.
c. Solve business-related problems and applications using critical thinking.
Objectives:
a. Identify the challenges of securing information with different types of attacks.
b. Define different types of malware and social engineering attacks.
c. Identify the different types of network, server and client-side attacks.
d. Explain how to secure a computer and the data.
e. Explain how network technologies can enhance security.
f. Define different network applications and how they can be secured.
g. Identify different types of wireless attacks and the solutions on how to secure against them.
h. Identity the risks associated with mobile devices and how to secure them.
Add to Pathway (opens a new window)
|