|
Dec 26, 2024
|
|
|
|
NET 166 - Applied Computer Security Credits: 3 Lecture Hours: 2 Lab Hours: 2 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech Basic concepts of practical computer and internet security: passwords, firewalls, antivirus software, malware, social networking, surfing the internet, phishing and wireless networks. This class is intended for students with little or no background in information technology or security. Basic knowledge of word processing required. Competencies
- Evaluate Network Security
- Implement security configuration parameters on network devices and other technologies
- Use secure network administration principles
- Explain network design elements and components
- Implement common protocols and services
- Troubleshoot security issues related to wireless networking
- Assess Compliance and Operational Security
- Explain the importance of risk related concepts
- Summarize the security implications of integrating systems and data with third parties
- Implement appropriate risk mitigation strategies
- Implement basic forensic procedures
- Summarize common incident response procedures
- Explain the importance of security related awareness and training
- Compare and contrast physical security and environmental controls
- Select the appropriate control to meet the goals of security
- Evaluate Threats and Vulnerabilities
- Explain types of malware
- Summarize various types of attacks
- Summarize social engineering attacks and the associated effectiveness with each attack
- Explain types of wireless attacks
- Explain types of application attacks
- Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
- Use appropriate tools and techniques to discover security threats and vulnerabilities
- Explain the proper use of penetration testing versus vulnerability scanning
- Differentiate Application, Data and Host Security
- Explain the importance of application security controls and techniques
- Summarize mobile security concepts and technologies
- Select the appropriate solution to establish host security
- Implement the appropriate controls to ensure data security
- Compare alternative methods to mitigate security risks in static environments
- Evaluate Access Control and Identity Management
- Compare and contrast the function and purpose of authentication services
- Explain appropriate authentication, authorization, and access control
- Install and configure security controls when performing account management, based on best practices
- Examin different methods of Cryptography and its use in digital security
- Describe general cryptography concepts
- Use appropriate cryptographic methods
- Discuss use appropriate PKI, certificate management and associated components
Add to Portfolio (opens a new window)
|
|