|
Covers an in-depth exploration of various communication protocols with a concentration on TCP/IP. Explores communication protocols from the point of view of the hacker in order to highlight protocol weaknesses. Includes Internet architecture, routing, addressing, topology, fragmentation and protocol analysis, and the use of various utilities to explore TCP/IP. Lecture 4 hours per week.
This course provides a “deep dive” into TCP/IP and other networking protocols and technologies. The student will learn how to use packet sniffing tools, such as Wireshark, to review network traffic to detect attack signatures and will be able to demonstrate, when provided with specific attack scenarios, an understanding of how to apply encryption and authentication technologies, such as IPSec and SSL, as countermeasures to such attacks. This course also includes content, as indicated below in parenthesis behind each learning objective, that directly maps to DHS/NSA’s Center of Academic Excellence – 2 Year (CAE2Y) criteria.
Prerequisite: ITN 260 - Network Security Basics |
|
Possible Assignments Include: (Subject to change each semester. The actual assignments are available in the Syllabus in the Blackboard course site on the first day of classes.)
Assignment |
Points |
Percentage of Grade |
Discussions |
600 |
10% |
Weekly Assignments |
700 |
20% |
Quizzes |
600 |
20% |
Midterm Exam |
100 |
25% |
Final Exam |
100 |
25% |
Your final grade will be based on the following scale. Please note that you must also pass both of the exams in order to pass the course, regardless of your scores on the other assignments.
Grading Scale |
A |
900-1000 |
90-100 |
B |
800-899 |
80-89 |
C |
700-799 |
70-79 |
D |
600-699 |
60-69 |
F |
0-599 |
0-59 |
|