Understand and apply fundamentals of security technologies in protecting networks.

  • Describe potential threats at each layers of TCP/IP model and most common computer systems.
  • Explain foundational technologies that can be used to mitigate the impact of these threats including cryptographic algorithms, key exchange protocols, and PKI.
  • Apply network and computer security concepts to develop threat analysis within the constraints of requirements, cost and technology.
  • Apply system hardening mechanisms to protect end hosts, networking equipment including routers and switches.

Required Course

  • CST 312: Network Security (4 units)