Information and Network Security Certificate Program
|
|
- Amos Howard
- 8 years ago
- Views:
Transcription
1 Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA
2 PROGRAM DESCRIPTION Data security is critical and increasingly important for specialty courses. The Information and Network Security Certificate Program in Information and Network Security helps industry professionals to better understand the management and security of modern public, government and enterprise networks. The program will be of interest to technical and nontechnical professionals involved in the design, development, financing, administration and management of secured information systems and networks. CERTIFICATE REQUIREMENTS The certificate is awarded upon successful completion of 18 credit units (9 required and 9 elective credit units) with a grade point average of B or better. This program is discontinued effective FALL No new candidates will be accepted into the program. If you have questions, please contact Rogelio Rodriguez at or via at rcrodrig@uci.edu. The curriculum focuses on developing a comprehensive understanding of the underlying principles for designing, engineering, and managing secure information systems environments. The program includes current findings from academic and technological research and state-of-the art practice. WHO SHOULD ATTEND Engineers, management personnel and those in other technical and managerial disciplines that are involved in the engineering, administration and/or management of secured information systems environments. PROGRAM BENEFITS Gain a fundamental understanding of security and network management practices. Learn essential criteria for public, private, governmental and corporate network security. Perform an evaluation of available network management practices and technology applications. Identify best practices for network hardware and security optimization. Design a secure network and perform effective data management and network configuration. CERTIFICATE CANDIDACY Bachelor's degree in engineering, computer science, business or management and two years of relevant experience; OR a relevant associate degree with at least four years work experience in the related fields of management, engineering or computer science, and the consent of the program manager. CURRICULUM 2
3 PREREQUISITE COURSE Introduction to Communications and Networking EECS X490 (3 units) Familiarize yourself with a "systems analysis approach" to the design and development of modern enterprise networks and systems. Learn how to analyze requirements and technical goals using the latest methods, technologies and tools. A typical communications system design process is discussed including identifying your customer's needs, goals and network configurations; transmission media and technology alternatives, e.g. copper wire, coaxial cable, fiber optics, wireless; system test and reliability; cost and performance analysis; leased versus private facilities; and regulatory and administrative considerations. Prerequisite: Basic understanding of mathematics and computers. REQUIRED COURSES (9 units) Essentials of Information Security EECS X490.6 (3 units) Learn how to build a concrete foundation on information systems security and successfully organize a secured environment. This course focuses on two subsections of IT Security: Managerial Security and Technical Security. Examples of each subsection are defined and explained. Topics include: History of IS Security, Security Attacks, Hacker Methods and Motivation, Legal Aspects of IS Security, Developing an effective Security Policy, IT Risk Assessment, Firewalls, Encryption and Hashing, Intrusion Detection, and Operating System Security. Communications and Networking OR equivalent Network Systems Security EECS X (3 units) Gain insight on how to deter intrusions into high-profile networks and information systems. Learn about the many software "tools" available to increase security against hackers and other unwelcome "guests." Increase your knowledge on how to secure your network by learning how to use these "tools" and configure them. Practical, hands-on instruction provides participants a thorough knowledge of NAT (Network Address Translation), PAT (Port Address Translation), Firewalls, Reflexive Access Lists, CHAP (Challenge Handshake Authentication Protocol), MD5 Hashing, and VLAN's (Virtual LAN's). Communications and Networking, or equivalent Advanced Security Management: Risk Assessment, Security, Policy Development, and Legal Aspects of Information Security EECS X (3 units) Learn how to perform a security risk and vulnerability assessment; create standards and a security policy appropriate to your needs; and explore legal aspects of security. Become expert in identifying threats and countermeasures via threat modeling, and utilizing monitoring tools and techniques for intrusion detection. Participants will engage in interactive discussions regarding information security, cyber-security, and other security issues associated with electronic mediums. Key policy issues addressed include the Sarbanes-Oxley Act, Gramm Leach Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), and ISO standards. Communications and Networking OR equivalent ELECTIVE COURSES (Candidates choose 9 units) Essentials of TCP/IP EECS X (3 units) Increase your understanding on how IP works, how upper layer protocols (TCP, ICMP, etc.) use underlying IP transport mechanisms to provide useful network services and how IP addressing and routing allows data to be exchanged in a global network. Learn practical IP design and troubleshooting techniques including analyzing network traces and network performance analysis. Participants benefit from this course by expanding their knowledge of TCP/IP network design and become more proficient in designing and implementing IP addressing and routing schemes. Communications and Networking, or equivalent Essentials of Client-Server Applications and Protocols EECS X (3 units) Today's networks are now recognized as the most important component in information processing. This has led to a style of computing called client/server, where the power of an individual computer is only limited by the network to which it is connected. This course provides an introduction to client/server computing and discusses its benefits as well as the advantages it offers over time-sharing 3
4 and networked PCs. Topics include: GUI (Graphical User Interface), Application Servers, Database Servers, Application Maintenance, and Application Integrity and Security. Prerequisite: EECS X490, Intro to Communications and Networking, or equivalent Theory and Applications of Cryptography in Computer Networks and Communications EECS X The rapid development of digital technology has lead to increased use of electronic encryption and the need for secured communications. Increase your familiarity of the mathematics behind cryptology and basic cryptographic algorithms. Learn real and practical cryptographic systems that are used for communications such as IPSec, Secure Sockets Layer Security (SSL), Transport Layer Security (TSL), and virtual private networks (VPN), as well as methods for securing information, digital signatures, and DRM (Digital Rights Management). Further your understanding of the technical issues of implementation and proper use of cryptography. Prerequisite: Familiarity with engineering mathematics, communications and networking technologies. Secured Networking and Cryptographic Systems EECS X (2.5 units) Today information is more accessible than ever. Our world is inescapably connected, and all businesses increasingly depend on digital communications. However, open communications and exchange of information exposes businesses to various security threats. This course provides a comprehensive study on different types of attacks on computers, computer networks, smart cards, set top boxes, wireless networks, and other communication systems. Develop strategies against theft of services and information. Increase your understanding of basic cryptographic algorithms such as AES and DES, along with algorithms for authentications such as MD5 and SHA-1, and algorithms for key exchange and public key cryptography such as RSA and Diffie-Hellman. Expand your knowledge on practical hardware and software implementation of the cryptographic algorithms. Participants also learn real and practical cryptographic systems that are used for communications such as IPSec, SSL/TLS, and VPN, as well as methods for securing information, and digital signatures. QUARTERLY SCHEDULE OF CLASSES Wireless Network Analysis and Security ENGRECE X (1.5 units) Increase your professional network troubleshooting skills in wireless networks. Learn to use protocol analysis and troubleshooting tools to identify, diagnose, and correct performance and security issues in wireless networks. Get hands-on training in (Ethernet) wireless technologies and related technologies. A series of lectures and lab exercises address all the skills you need to correctly implement and maintain wireless networks. Gain valuable hands-on experience in a wireless networked environment utilizing the Network Instruments Observer 9 protocol analyzer. Prerequisite: EEXS X490, Introduction to Communications and Networking OR equivalent Advanced Security Lab: Firewalls and VPN Design and Configuration EECS X (3 units) Update your security design skills and learn how to plug holes in firewall architectures. Increase your knowledge on packet filtering (stateless classification) and stateful (flow processing) firewall design and configuration using the Firewall Feature Set imbedded in Cisco Routers. Learn why Virtual Private Networks (VPN's) have become so popular and how to configure and test them. This hands-on lab includes "challenges" from other course participants posing as hackers to test the effectiveness of the security controls. Implementing Disaster Recovery and Business Continuity Plans for Secured Systems EECS X (3 units) Learn the justification for disaster recovery programs and planning strategies for facility protection and recovery. Examine the differences between a centralized system, a decentralized system, and end user recovery disaster recovery methodologies. Prepare for the unexpected by implementing and executing a test scenario. COURSE # PREREQUISITE COURSE W SP SU F 4
5 EECS_X490 Introduction to Communications and Networking (3 units) EECS_X Essentials of TCP/IP (3 units) COURSE # REQUIRED COURSES (9 units) W SP SU F EECS_X490.6 Essentials of Information Security (3 units) EECS_X Network Systems Security (3 units) EECS_X Advanced Security Management: Risk Assessment, Security Policy Development, and Legal Aspects of Information Security (3 units) COURSE # ELECTIVE COURSES (9 units) W SP SU F EECS_X Essentials of Client/Server Applications and Protocols (3 units) EECS_X Theory and Applications of Cryptography in Computer Networks and Communications (2.5 units) EECS_X Wireless Network Analysis and Security (3 units) EECS_X Advanced Security Lab: Firewall and VPN Design and Configuration (3 units) EECS_X Implementing Disaster Recovery and Business Continuity Plans for Secured Systems (1.5 units) For the most current schedule of classes, please go online to the UCI Extension catalog at extension.uci.edu Note: Schedules are subject to change O=Online, W=Winter, SP=Spring, SU=Summer, F=Fall 5
6 APPLICATION FOR CANDIDACY This form must be submitted, along with a filing fee of $125, after the completion of the third course. NAME Mr. Mrs. Ms. HOME ADDRESS CITY STATE ZIP PHONE: DAY EVENING SOCIAL SECURITY NUMBER JOB TITLE EMPLOYER EMPLOYER ADDRESS Payment must be included with application. CHECK ENCLOSED (MADE PAYABLE TO REGENTS OF THE UNIVERSITY OF CALIFORNIA) CHARGE TO VISA MASTERCARD AMERICAN EXPRESS ACCOUNT NUMBER: EXP DATE: AUTHORIZATION SIGNATURE: Mail To: UNIVERSITY OF CALIFORNIA, IRVINE UNIVERSITY EXTENSION PO BOX 6050, IRVINE, CA OR FAX TO: (949)
7 REQUEST FOR CERTIFICATE DATE: University of California, Irvine Extension Programs in Engineering & Science Technologies P.O. Box 6050 Irvine, CA FAX (949) The course in which I am now enrolled* is the last one to be completed before I am eligible to receive the certificate in: I have submitted my Application of Candidacy. Names: Certificate to be mailed to: Name to be inscribed on certificate- PLEASE PRINT Number and Street City State Zip Daytime Phone Social Security Number Signature * Name of course in which you are now enrolled: PLEASE DO NOT SUBMIT THIS FORM UNLESS YOU ARE ACTUALLY ENROLLED IN YOUR FINAL COURSE AND IT HAS STARTED. 7
How To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
More informationCommunications and Networking Engineering Certificate Program
Communications and Networking Engineering Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Stay in pace with changes
More informationComputer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
More informationImplementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
More informationHow To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
More informationAsheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationComputer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
More informationACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
More informationOccupational Safety and Health Certificate Program
Occupational Safety and Health Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Safety and health professionals play
More informationCCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
More informationCourse Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)
Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationIINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationImplementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
More informationCCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationInformation Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
More informationCisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
More informationNetworking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
More informationTim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
More information(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationFundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationCCNA Cisco Associate- Level Certifications
CCNA Cisco Associate- Level Certifications Routing & Switching Security Voice Wireless Advance your network engineering skills in working on complex Cisco network solutions. WWW.FASTLANEUS.COM Cisco CCNA
More informationHughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
More informationinformation security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
More informationSecurity Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
More informationInformation Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
More informationCCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated June 18, 2009 Note: The English version of this course is scheduled to be generally available in July 2009. Target Audience The Cisco CCNA Security course
More informationSecuring Networks with Cisco Routers and Switches 1.0 (SECURE)
Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network
More informationNetwork Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationASM Educational Center (ASM) Est. 1992
CompTIA Network+ Certification Course Outline Objective 1.1 - The OSI and TCP/IP Models The OSI and TCP/IP Models OSI Layer 7 OSI Layer 6 OSI Layer 5 OSI Layer 4 OSI Layer 3 OSI Layer 2 OSI Layer 1 LAN
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More information70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationEUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
More informationFacilities Management Certificate Program
Facilities Management Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Facility management is the practice of coordinating
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationNEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
More informationTable of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
More informationChapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationCSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
More informationREDCENTRIC MANAGED FIREWALL SERVICE DEFINITION
REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION SD007 V4.1 Issue Date 04 July 2014 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s managed firewall service (MFS) is based on a hardware firewall appliance
More informationOverview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationCDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview
More informationCase Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
More informationMIS NETWORK ADMINISTRATOR PROGRAM
Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as: Installation
More informationTable of Contents. Introduction
viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification
More informationBachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
More informationReport to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationFRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
More informationVoice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
More informationNetworking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
More informationSite to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationNetwork Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
More informationSecure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity
Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationSecurity Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems
Course Overview Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router s IPSec 3002 IKE 515 CA s Intrusion Detection Systems 4210 VPNs Routers 2 The security threats section will cover
More informationSecure Network Foundation 1.1 Design Guide for Single Site Deployments
Secure Network Foundation 1.1 Design Guide for Single Site Deployments This document provides a simple vision for a smart and secure business where everyday communications are made easier, faster, and
More informationOS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: sweatm@us.ibm.com Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of
More informationPROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
More informationCISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
More informationHow To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de
More informationFirewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
More informationWireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationCity University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
More informationTYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
More informationFBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
More informationVPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
More informationathenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
More informationCisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
More informationPre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
More information3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
More information642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationImplementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
More informationICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
More informationCisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers
Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
More information