cyb120 | undergraduate

Computer Network Defense Part 1

Explore by:

or call us at



This course provides network training on Computer Network Defense fundamentals; security threats, vulnerabilities, and attacks; controls, protocols and devices; and security policy design and implementation.

This undergraduate-level course is 5 weeks This course is available to take individually or To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5 weeks

topic title goes here

    Network Security Threats, Vulnerabilities, and Attacks

    • Describe the effects of network security breaches on business continuity.
    • Explain ways to defend against ten of the most common network attacks.
    • Identify types of network threats, attacks, and vulnerabilities.

    Network Security Threats, Vulnerabilities, and Attacks (Continued)

    • Identify the different categories of network threats and network security vulnerabilities.
    • Describe the different categories of network attacks.
    • Describe types of network attacks.

    Network Security Controls, Protocols, and Devices

    • Explain the relevance of the SANS 20 Critical Security Controls and how they can help defend your network.
    • Illustrate network protocols, their purpose, and how attacks can occur within a given protocol.
    • Identify and describe the different types of perimeter appliances and their purpose.

    Network Security Policy Design and Implementation

    • Describe the need and important characteristics of a good security policy.
    • Describe the typical contents of a security policy and how to design a security policy.
    • Identify security related standards, laws, and acts.
    • Describe the steps for creating and implementing a security policy.

    Computer Network and Defense Fundamentals

    • Compare host-based protections and computer network defense.
    • Describe how the Open System Interconnect (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models apply to network security.
    • Describe the most common threats to network security.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.