CYBR434 — Network Security

3 credits Catalog-Derived

Practical topics in network security including policy, malicious code, intrusion detection, and cryptographic protocols.

5
Objectives
30
Matches
30
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
52.4% Information Security Engineers 20t
52.0% Penetration Testers 18t
56.8% Computer Network Architects 15t
52.3% Computer Network Support Specialist 14t
63.5% Network and Computer Systems Admini 11t

Learning Objectives & Matches

LO1

Configure and manage network security devices including firewalls, IDS, and IPS

10 O*NET task matches
Batch:
Network and Computer Systems A 3.7/5
58% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 approved at 300
Computer Network Architects 4.3/5
57% ok

Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.

Claude Opus 4.6 approved at 300
Computer Network Support Speci 3.5/5
52% ok

Install and configure wireless networking equipment.

Claude Opus 4.6 denied
Penetration Testers
50% ok

Design security solutions to address known device vulnerabilities.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.7/5
49% ok

Troubleshoot security and network problems.

Claude Opus 4.6 approved at 200
Computer Network Support Speci 3.9/5
48% ok

Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.

Claude Opus 4.6 denied
Computer and Information Resea 3.7/5
47% ok

Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.

Claude Opus 4.6 approved at 200
Computer Systems Engineers/Arc 4.2/5
46% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 200
Computer Network Support Speci 4.0/5
45% ok

Install network software, including security or firewall software.

Claude Opus 4.6 denied
Computer Network Support Speci 4.0/5
45% ok

Configure wide area network (WAN) or local area network (LAN) routers or related equipment.

Claude Opus 4.6 denied
LO2

Deploy and monitor intrusion detection and prevention systems for threat detection

10 O*NET task matches
Batch:
Web Administrators 4.8/5
58% ok

Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.

Claude Opus 4.6 denied
Digital Forensics Analysts
56% ok

Analyze log files or other digital information to identify the perpetrators of network intrusions.

Claude Opus 4.6 denied
Information Security Analysts 3.8/5
54% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 300
Information Security Engineers 4.4/5
52% ok

Coordinate monitoring of networks or systems for security breaches or intrusions.

Claude Opus 4.6 approved at 300
Web Developers 3.7/5
48% ok

Monitor security system performance logs to identify problems and notify security specialists when problems occur.

Claude Opus 4.6 denied
Information Security Engineers 3.7/5
47% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 200
Information Security Engineers 3.9/5
47% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 200
Network and Computer Systems A 3.7/5
46% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 approved at 200
Penetration Testers
45% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 approved at 200
Web Developers
45% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
LO3

Apply cryptographic protocols including TLS, VPN, and IPsec for secure communications

10 O*NET task matches
Batch:
Blockchain Engineers
69% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Blockchain Engineers
49% ok

Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.

Claude Opus 4.6 denied
Information Security Analysts 4.2/5
46% ok

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Claude Opus 4.6 denied
Web Developers
44% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Mathematicians 2.8/5
42% ok

Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
41% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
40% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 denied
Web Administrators 4.2/5
39% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
39% ok

Develop information security standards and best practices.

Claude Opus 4.6 denied
Web Administrators 4.5/5
39% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
LO4

Implement network segmentation and access control lists for defense in depth

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
LO5

Analyze network traffic for security threats using packet capture and analysis tools

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)