CS 285 Network Defense Security

This course provides an introduction to the core security concepts and skills needed for the installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices. It helps prepare students for entry-level security career opportunities and the globally recognized Cisco CCNA Security certification. The National Security Agency (NSA) and the Committee on National Security Systems (CNSS) recognizes that Cisco CCNA Security certification courseware meets the CNSS 4011 training standard. By being compliant, the Cisco CCNA Security course and certification program provides the required training for network security professionals who assist federal agencies and private sector entities to protect their information and aid in the defense of the nation's vital information resources. This course is a hands-on, lab-oriented curriculum with an emphasis on practical experience to help students develop specialized security skills, along with critical thinking and complex problem solving skills. Students who enroll in Network Defensive Security are expected to have fundamental router/switching level networking knowledge and skills, along with basic PC and internet navigation understanding.

Credits

4

Prerequisite

Prerequisite: CIS 151 Networking Essentials, CIS 152 Router Configurations, CS 284 Computer Security & Information Assurance with a C or better.

Offered

Offered Winter only

Notes

Career Technical Education (CTE) Course

Outcomes

Upon successful completion of this course, students will be able to:
Describe the security threats facing modern network infrastructures. Secure network device access. Implement AAA on network devices. Mitigate threats to network using ACLs. implement secure network management and reporting. Mitigate common Layer 2 attacks. Implement the IOS firewall feature set. Implement an Adaptive Security Appliance. Implement the IOS. IPS feature set. Implement site to site IPSec VPNs. Administer effective security policies.