CYBR434 — Network Security
Practical topics in network security including policy, malicious code, intrusion detection, and cryptographic protocols.
Learning Objectives & Matches
Configure and manage network security devices including firewalls, IDS, and IPS
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
Install and configure wireless networking equipment.
Design security solutions to address known device vulnerabilities.
Troubleshoot security and network problems.
Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
Provide customers or installation teams guidelines for implementing secure systems.
Install network software, including security or firewall software.
Configure wide area network (WAN) or local area network (LAN) routers or related equipment.
Deploy and monitor intrusion detection and prevention systems for threat detection
Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
Analyze log files or other digital information to identify the perpetrators of network intrusions.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Coordinate monitoring of networks or systems for security breaches or intrusions.
Monitor security system performance logs to identify problems and notify security specialists when problems occur.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Identify or implement solutions to information security problems.
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
Design and implement Web site security measures, such as firewalls and message encryption.
Apply cryptographic protocols including TLS, VPN, and IPsec for secure communications
Design and verify cryptographic protocols to protect private information.
Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Design and implement Web site security measures, such as firewalls and message encryption.
Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
Provide customers or installation teams guidelines for implementing secure systems.
Identify or implement solutions to information security problems.
Implement Web site security measures, such as firewalls or message encryption.
Develop information security standards and best practices.
Identify, standardize, and communicate levels of access and security.
Implement network segmentation and access control lists for defense in depth
Analyze network traffic for security threats using packet capture and analysis tools