Send More Info
Apply Now
Classroom Login
Call Now
Call Now 855-300-1469

CYB 5290 Secure Data Communications and Networks


Course Description

This course explores data communications, networking, and network security. A foundation of networking will be provided, including topics such as TCP/IP, other communications protocols, and routing. Practical network security schemes will enable the student to identify and implement a variety of network and communications security measures.

Course Objectives

Upon completion of this course, students should be able to

  1. Understand the communications model
  2. Evaluate various digital communications protocols
  3. Understand network security attacks
  4. Evaluate components of network security
  5. Understand communications encryption

Week 1


Lecture: Network Foundations I

Outcomes

  • Computer Networks: Definitions and applications
    • Network Node, Interfaces and Links
    • Point-to-Point vs. Multi-point
    • Circuit Switch vs. Packet Switched
    • Resource Sharing and Network Protocols
Lecture: Network Foundations II

Outcomes

  • Network capacity and delay
  • Introduction on Layered Network Protocols
    • Layered protocols
    • Functional Description of Important Network Layers
    • Encapsulation

Week 2


Lecture: The OSI Model

Outcomes

  • The Seven-Layer OSI Model
  • Description and functionality of each layer
  • Brief introduction of protocols on each layer
Lecture: Network Applications

Outcomes

  • Client Server applications
  • Peer-to-Peer applications
  • The need for multi-layer protocols
Lecture: The Link-Layer

Outcomes

  • Data-Link and MAC sub-layers
  • Addressing
  • Medium-Access Control

Week 3


Lecture: The Network Layer

Outcomes

  • Network Addressing (IPv4 and IPv6)
  • Routing Protocols
Lecture: Transport Protocols

Outcomes

  • TCP and UDP
  • Multicast and broadcast protocols

Week 4


Lecture: Network Monitoring and Traffic Analysis
Outcomes
  • Packet Capture
  • Netflow
    • Brief Introduction and Description
    • Sources of Netflow data (routers and packet capture)
  • Server Logs for Network Access

Week 5


Lecture: Internetworking Services

Outcomes

  • Domain Name Services
  • Web, Mail and FTP services
Lecture: Requirements for Secure Networking Services

Outcomes

  • Authentication
  • Confidentiality
  • Integrity
  • Availability
  • Non-Repudiation

Week 6


Lecture: Encryption

Outcomes

  • Symmetric Key Encryption
  • Asyemmetric encryption
  • Key distribution
  • Publix key encryption

Week 7


Lecture: Classic Attacks and Countermeasures

Outcomes

  • Mapping
  • Packet Sniffing
  • Spoofing
  • DoS
  • Hijacking
Lecture: Firewalls

Outcomes

  • Network and host-based firewalls
  • Firewall rules examples
  • Strengths and Weaknesses

Week 8


Lecture: Intrusion Detection and Protection Systems

Outcomes

  • Network and host-based IDS
  • IDS Examples and discussion
  • IPS Examples and discussion

The course description, objectives and learning outcomes are subject to change without notice based on enhancements made to the course.