Course Description
This course explores data communications, networking, and network security. A foundation of networking will be provided, including topics such as TCP/IP, other communications protocols, and routing. Practical network security schemes will enable the student to identify and implement a variety of network and communications security measures.
Course Objectives
Upon completion of this course, students should be able to
- Understand the communications model
- Evaluate various digital communications protocols
- Understand network security attacks
- Evaluate components of network security
- Understand communications encryption
Week 1
Lecture: Network Foundations I
Outcomes
- Computer Networks: Definitions and applications
- Network Node, Interfaces and Links
- Point-to-Point vs. Multi-point
- Circuit Switch vs. Packet Switched
- Resource Sharing and Network Protocols
Lecture: Network Foundations II
Outcomes
- Network capacity and delay
- Introduction on Layered Network Protocols
- Layered protocols
- Functional Description of Important Network Layers
- Encapsulation
Week 2
Lecture: The OSI Model
Outcomes
- The Seven-Layer OSI Model
- Description and functionality of each layer
- Brief introduction of protocols on each layer
Lecture: Network Applications
Outcomes
- Client Server applications
- Peer-to-Peer applications
- The need for multi-layer protocols
Lecture: The Link-Layer
Outcomes
- Data-Link and MAC sub-layers
- Addressing
- Medium-Access Control
Week 3
Lecture: The Network Layer
Outcomes
- Network Addressing (IPv4 and IPv6)
- Routing Protocols
Lecture: Transport Protocols
Outcomes
- TCP and UDP
- Multicast and broadcast protocols
Week 4
Lecture: Network Monitoring and Traffic Analysis
Outcomes
- Packet Capture
- Netflow
- Brief Introduction and Description
- Sources of Netflow data (routers and packet capture)
- Server Logs for Network Access
Week 5
Lecture: Internetworking Services
Outcomes
- Domain Name Services
- Web, Mail and FTP services
Lecture: Requirements for Secure Networking Services
Outcomes
- Authentication
- Confidentiality
- Integrity
- Availability
- Non-Repudiation
Week 6
Lecture: Encryption
Outcomes
- Symmetric Key Encryption
- Asyemmetric encryption
- Key distribution
- Publix key encryption
Week 7
Lecture: Classic Attacks and Countermeasures
Outcomes
- Mapping
- Packet Sniffing
- Spoofing
- DoS
- Hijacking
Lecture: Firewalls
Outcomes
- Network and host-based firewalls
- Firewall rules examples
- Strengths and Weaknesses
Week 8
Lecture: Intrusion Detection and Protection Systems
Outcomes
- Network and host-based IDS
- IDS Examples and discussion
- IPS Examples and discussion
The course description, objectives and learning outcomes are subject to change without notice based on enhancements made to the course.