INSE 415 Computer and Network Security

Learn the tools, techniques, processes and software used to secure data communications networks. This course provides a review of network vulnerabilities, common attack vectors, and methods for preventing, detecting and techniques for minimizing the effects of network attacks using commonly available software tools. Learn how to best implement network security and incorporate best practices into an organization to defend networks.

Credits

5

Cross Listed Courses

None

Prerequisite

All Technology Core courses

Corequisite

None

Washington Technology University

Syllabus

INSE 415 : Computer and Network Security

5 Credits

Approved: 12/2/2021 2:17:09 PM

Course Description

Learn the tools, techniques, processes and software used to secure data communications networks. This course provides a review of network vulnerabilities, common attack vectors, and methods for preventing, detecting and techniques for minimizing the effects of network attacks using commonly available software tools. Learn how to best implement network security and incorporate best practices into an organization to defend networks.

Course Required Resources

  • Stewart, J. Michael. (2014). Network security, firewalls and vpns. Burlington, Massachusetts: Jones & Bartlett.
  • Knapp, Eric. (2015). Industrial network security: securing critical infrastructure networks for smart grid, scada, and other industrial control systems. Syngress Publishing.

Course Keywords

Auditing, Client-server, Cloud computing, HTML, HTTP, Packet switching, Virtualization, VPN, Clickjacking, Malware, Pretexting, Ransomware, Social Engineering, Advanced Encryption Standard (AES), Digital Certificate, JavaScript, Web application, Vulnerability management, PCI, Resource pooling, Elasticity, Private Cloud, IaaS, PaaS, SaaS, STARS, Service level agreements, Integration testing, Security testing, Stress testing, Security assessment, Nmap, OS fingerprint, Nessus, Vulnerability assessment, Web server application, Data leakage, Client-side injection, VoIP, Active server pages (ASP), Business intelligence, Deep web, Computer incident response team, Common