Understand and apply fundamentals of security technologies in protecting networks.
- Describe potential threats at each layers of TCP/IP model and most common computer systems.
- Explain foundational technologies that can be used to mitigate the impact of these threats including cryptographic algorithms, key exchange protocols, and PKI.
- Apply network and computer security concepts to develop threat analysis within the constraints of requirements, cost and technology.
- Apply system hardening mechanisms to protect end hosts, networking equipment including routers and switches.
Required Course
- CST 312: Network Security (4 units)