Sep 23, 2020  
2016-2017 Catalog 
    
2016-2017 Catalog [PAST CATALOG]

CTS 140 - Network Security Fundamentals

4 credit hours - Four hours of lecture and directed laboratory weekly; one term.
(Formerly CSI 165 - Network Security Fundamentals)

Learn the current risks and threats to an organization’s data together with ways to safeguard critical electronic assets, including network services, devices, traffic and data. Develop a foundation to prepare for further study in other specialized security fields. This course addresses the core material of the CompTIA Security+ exam objectives. Lab fee $40.

Prerequisite(s): CTS 110   or CTS 130 .

Note: CTS 110  and CTS 130  may be taken concurrently with CTS 140 with permission of the CTS department chair.

Course Outcomes
Upon successful completion of this course, students will be able to:
 

  • Identify security threats to network services, devices, traffic and data
    • Describe the challenges of security information
    • Define information security and explain why it is important
    • Identify the types of attackers that are common today
    • List the basic steps of an attack
  • Harden internal systems and services
    • List the five basic principles of defense
    • List the techniques for mitigating and deterring attacks
    • Identify and explain authentication techniques
  • Harden inter-network devices and services
    • Carry out appropriate procedures to establish host security
    • Analyze and differentiate among types of mitigation and deterrent techniques
    • Explain the importance of and implement application security
  • Secure Network Communications
    • List the different types of network security devices and explain how they can be used
    • Define network address translation and network access control
    • Explain how to enhance security through network design
  • Manage a PKI
    • Describe the components of Public Key Infrastructure (PKI)
    • List the tasks associated with key management
    • Implement PKI and associated components
  • Manage Certificates
    • Define Digital Certificates
    • List the various types of digital certificates and how they are used
    • Implement Certificate Management
  • Enforce an organizational security policy
    • Define environmental controls
    • Describe the components of redundancy planning
    • List disaster recovery procedures
    • Describe incident responses procedures
    • Explain how to control risk
    • List the types of security policies
    • Describe how awareness and training can provide increased security
  • Monitor the security infrastructure
    • Describe the network security topologies
    • Explain the function and operation of intrusion detection systems
    • Describe the different types of intrusion detection systems
  • Identify the characteristics of various media
    • Use and apply appropriate cryptographic tools and products
    • Compare and contract media used in business continuity
    • Execute disaster recovery plans and procedures
Core Competencies
Core 1 Communication Core 2 Technology Fluency Core 3 Information Literacy Core 6 Scientific Reasoning Core 10 Innovative and Critical Thinking