National CAE Designated Institution
  • Classroom
  • Online, Self-Paced
Course Description

The goal of this course is to cover the theoretical and practical aspects of network security. This course will provide students with the understandings of what is computer/network security, the technologies involved and the current solutions to certain threats. This course will provide students up to date information on network-based and internet-based security applications. Upon completing this course, students should be able to: Understand threats and sources of attacks in network security and understand the limitation of the current security technology and able to choose proper security mechanism given types of network and threats involved. Be able to design and implement security measures based on requirements and identify and investigate threats to network security.

Learning Objectives

  1. Demonstrate an understanding of the theoretical and practical aspects of network security.
  2. Demonstrate an understanding of what is computer / network security.
  3. Demonstrate an understanding of the technologies involve and the current solutions to certain threats
  4. Demonstrate an understanding of the Date information on network-based and internet-based security applications.
  5. Demonstrate an understanding of threats and sources of attacks in network security.
  6. Demonstrate an understanding of the limitation of the current security technology and able to choose proper security mechanism given types of network and threats involve.
  7. Demonstrate an understanding of how to handle various attacks.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Network Services

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.