Send More Info
Apply Now
Classroom Login
Call Now
Call Now 855-300-1469

CYB 5290 Secure Data Communications and Networks

Course Description

This course explores data communications, networking, and network security. A foundation of networking will be provided, including topics such as TCP/IP, other communications protocols, and routing. Practical network security schemes will enable the student to identify and implement a variety of network and communications security measures.

Course Objectives

Upon completion of this course, students should be able to

  1. Understand the communications model
  2. Evaluate various digital communications protocols
  3. Understand network security attacks
  4. Evaluate components of network security
  5. Understand communications encryption

Week 1

Lecture: Network Foundations I


  • Computer Networks: Definitions and applications
    • Network Node, Interfaces and Links
    • Point-to-Point vs. Multi-point
    • Circuit Switch vs. Packet Switched
    • Resource Sharing and Network Protocols
Lecture: Network Foundations II


  • Network capacity and delay
  • Introduction on Layered Network Protocols
    • Layered protocols
    • Functional Description of Important Network Layers
    • Encapsulation

Week 2

Lecture: The OSI Model


  • The Seven-Layer OSI Model
  • Description and functionality of each layer
  • Brief introduction of protocols on each layer
Lecture: Network Applications


  • Client Server applications
  • Peer-to-Peer applications
  • The need for multi-layer protocols
Lecture: The Link-Layer


  • Data-Link and MAC sub-layers
  • Addressing
  • Medium-Access Control

Week 3

Lecture: The Network Layer


  • Network Addressing (IPv4 and IPv6)
  • Routing Protocols
Lecture: Transport Protocols


  • TCP and UDP
  • Multicast and broadcast protocols

Week 4

Lecture: Network Monitoring and Traffic Analysis
  • Packet Capture
  • Netflow
    • Brief Introduction and Description
    • Sources of Netflow data (routers and packet capture)
  • Server Logs for Network Access

Week 5

Lecture: Internetworking Services


  • Domain Name Services
  • Web, Mail and FTP services
Lecture: Requirements for Secure Networking Services


  • Authentication
  • Confidentiality
  • Integrity
  • Availability
  • Non-Repudiation

Week 6

Lecture: Encryption


  • Symmetric Key Encryption
  • Asyemmetric encryption
  • Key distribution
  • Publix key encryption

Week 7

Lecture: Classic Attacks and Countermeasures


  • Mapping
  • Packet Sniffing
  • Spoofing
  • DoS
  • Hijacking
Lecture: Firewalls


  • Network and host-based firewalls
  • Firewall rules examples
  • Strengths and Weaknesses

Week 8

Lecture: Intrusion Detection and Protection Systems


  • Network and host-based IDS
  • IDS Examples and discussion
  • IPS Examples and discussion

The course description, objectives and learning outcomes are subject to change without notice based on enhancements made to the course.