Jan 15, 2025  
2024-25 Catalog 
    
2024-25 Catalog
Add to Portfolio (opens a new window)

CIS 166 - Network Defense

5 Credits
This course builds on the fundamental knowledge of computer networking to introduce the offensive and defensive consideration of network security. Topics include managing vulnerabilities in network hosts, monitoring traffic, and recovering from incidents.

Pre-requisite(s) CIS 160 min 2.0 and CIS 215 min 2.0
FeesAcademic Technology Fee

Quarters Typically Offered
Designed to Serve Students enrolled in CIS programs and industry professionals with computing experience.
Active Date 20240401T16:33:50

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
PLA Eligible Yes

Course Outline
  1. Recognized Domains of Information Security
  2. Threat and Vulnerability Assessment
  3. Computer Security Model Basics
  4. Security Policies
  5. Physical Security
  6. Network Access Methods
  7. Operating System Vulnerabilities
    1. Detection
    2. Remediation
  8. Intrusion Detection Systems
  9. Digital certificates
    1. Authentication
    2. Cryptography
  10. Attacks on the network and frameworks for describing tactics, techniques, and procedures
  11. Incident Reports
  12. Disaster Recovery


Student Learning Outcomes
Describe the key concepts in network defense

Explain how network defense tools are used to defend against attacks and mitigate vulnerabilities

Analyze how security policies are implemented on systems to protect a network

Evaluate how network operational procedures relate to network security

Describe appropriate measures to be taken should a system compromise occur

Describe potential system attacks and the actors that might perform them

Describe cyber defense tools, methods and components and apply cyber defense methods to prepare a system to repel attacks

Describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g., key management), etc.



Add to Portfolio (opens a new window)