CTS 1120 - Network Security Foundations
College of Computer & Information Technology
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Summer 2021 (590)
Course Description
It is recommended that the student have previous computer network training or experience. This course provides the students with an overview of Information Technology (IT) Security and introduces the components necessary to secure network information systems. Topics include security policies, Intrusion Detection Systems (IDS), firewalls, operating system security and network security basics. Students will also be introduced to current hacker techniques and log auditing processes. Current computer security issues will also be explored as class projects. This course along with CIS1358 prepares students for the Security+ certification offered by CompTIA. (Note: Credit is only given for CTS 1120 or CJE 1678.)
Learning Outcomes and Objectives
- The student will explain the importance of Network Security by:
- implementing security configuration parameters on network devices and other technologies.
- using secure network administration principles.
- explaining network design elements and components.
- implementing common protocols and services.
- troubleshooting security issues related to wireless networking.
- The student will evaluate Security Policy Compliance and Operational Security by:
- explaining the importance of risk related concepts.
- summarizing the security implications of integrating systems and data with third parties.
- implementing appropriate risk mitigation strategies.
- implementing basic forensic procedures.
- summarizing common incident response procedures.
- explaining the importance of security related awareness and training
- comparing and contrasting physical security and environmental controls.
- summarizing risk management best practices.
- selecting the appropriate control to meet the goals of security.
- The student will analyze threats and vulnerabilities by:
- explaining types of malware.
- summarizing various types of attacks.
- summarizing social engineering attacks and the associated effectiveness with each attack.
- explaining types of wireless attacks.
- explaining types of application attacks.
- explaining types of application attacks.
- evaluating a scenario and select the appropriate type of mitigation and deterrent techniques.
- using appropriate tools and techniques to discover security threats and vulnerabilities
- explaining the proper use of penetration testing versus vulnerability scanning
- The student will analyze Application, Data and Host Security by:
- explaining the importance of application security controls and techniques.
- summarizing mobile security concepts and technologies.
- selecting the appropriate solution to establish host security
- implementing the appropriate controls to ensure data security.
- comparing and contrasting alternative methods to mitigate security risks in static environments.
- The student will analyze Access Control and Identity Management by:
- comparing and contrasting the function and purpose of authentication services.
- selecting the appropriate authentication, authorization or access control
- installing and configuring security controls when performing account management, based on best practices.
- The student will explain the fundamentals of cryptography by:
- utilizing general cryptography concepts.
- using appropriate cryptographic methods
- using appropriate PKI, certificate management and associated components.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual course instructors.
History of Changes
C&I 5/28/02, BOT 7/29/02, Effective yrtr 20021.
Flex access 20041(0340).
3 Year Review 2005, effective 20061(0370).
Prefix/# chg SCNS F.R. eff20091(0415).
3-Year Review 2009.
C&I Approval: 05/28/2002, BOT Approval: 07/29/2002, Effective Term: Fall 2009 (415).
C&I Approval: 11/20/2015, BOT Approval: 03/15/2016, Effective Term: Fall 2016 (520).
C&I Approval: 08/12/2016, BOT Approval: 09/20/2016, Effective Term: Spring 2017 (525).
C&I Approval: , BOT Approval: , Effective Term: Summer 2021 (590)
Related Programs
- Applied Cybersecurity PCS (ITSCHS-AR) (545) (Active)
- Applied Cybersecurity PTC (CYSECTC-AR) (615) (Active)
- Cloud Computing (CLOUD-CT) (640) (Active)
- Cloud Computing Technology (CLOUD-AS) (640) (Active)
- CompTIA Security+ (to CIT-AS) (TIASEC1IC-AR) (600) (Active)
- CompTIA Security+ (to CJPSS-AS) (TIASEC7IC-AR) (600) (Active)
- CompTIA Security+ (to CLOUD-AS) (TIASEC8IC-AR) (650) (Active)
- CompTIA Security+ (to CRCI-CT) (TIASEC3IC-AR) (600) (Active)
- CompTIA Security+ (to DIGFORN-AS) (TIASEC6IC-AR) (600) (Active)
- CompTIA Security+ (to HDSK-CT) (TIASEC4IC-AR) (600) (Active)
- CompTIA Security+ (to ITSC-AS) (TIASEC2IC-AR) (600) (Active)
- CompTIA Security+ (to ITSC-CT) (TIASEC5IC-AR) (600) (Active)
- Computer Information Technology (CIT-AS) (640) (Active)
- Computer Related Crime Investigation (CRCI-CT) (625) (Active)
- Computer Related Crime Investigation (CRCI-CT) (585) (Draft)
- Computer Systems and Information Technology PCS (CSITHS-AR) (635) (Active)
- Computer Systems and Information Technology PTC (CSITTC-AR) (605) (Active)
- Cybersecurity (CYSEC-TR) (670) (Active)
- Cybersecurity (CYSEC-BAS) (610) (Active)
- Cybersecurity (ITSC-AS) (640) (Active)
- Cybersecurity (ITSC-AS) (640) (Draft)
- Cybersecurity (ITSC-CT) (510) (Active)
- Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
- Financial Technology Specialist (FINTECH-CT) (660) (Active)
- Financial Technology Specialist (FINTECH-CT) () (Draft)
- Help Desk Support Specialist (HDSK-CT) (530) (Active)
- Public Safety (CJPSS-AS) (645) (Active)
- Public Safety Administration (PSA-TR) (670) (Active)
- Technology Development & Management (TMGT-TR) (670) (Active)
