Course description

This course provides a practical overview of network security and related topics. General threat classifications are discussed as they relate to the CIA triad: eavesdropping (confidentiality), man-in-the-middle (integrity), and denial-of-service (availability). Real-world attack incidents and implementations are used to tie concept to reality. Defensive technologies and techniques, including authentication/authorization, access control, segmentation, log/traffic monitoring, reputation-based security, and secure protocol (SSH, TLS, DNSSEC) usage are discussed and demonstrated. Hands-on labs and exercises are used to reinforce lectures and provide practical implementation experience.

Instructors

You may also like