Skip to Main Content Skip to bottom Skip to Chat, Email, Text
"Degrees & Programs"


Computer Network Defense Part 1




Estimated Tuition


Total credits


Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course provides network training on Computer Network Defense fundamentals; security threats, vulnerabilities, and attacks; controls, protocols and devices; and security policy design and implementation.



What you'll learn

Course skills and outcomes

Week 1

  • Compare host-based protections and computer network defense.
  • Describe how the Open System Interconnect (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models apply to network security.
  • Describe the most common threats to network security. 

Week 2

  • Identify types of network threats, attacks, and vulnerabilities. 
  • Describe the effects of network security breaches on business continuity.
  • Explain ways to defend against ten of the most common network attacks.

Week 3

  • Identify the different categories of network threats and network security vulnerabilities. 
  • Describe the different categories of network attacks.
  • Describe types of network attacks. 

Week 4

  • Explain the relevance of the SANS 20 Critical Security Controls and how they can help defend your network. 
  • Illustrate network protocols, their purpose, and how attacks can occur within a given protocol. 
  • Identify and describe the different types of perimeter appliances and their purpose.

Week 5

  • Describe the need and important characteristics of a good security policy. 
  • Describe the typical contents of a security policy and how to design a security policy. 
  • Identify security related standards, laws, and acts. 
  • Describe the steps for creating and implementing a security policy.


Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission ( for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Start a conversation about your future with an enrollment representative today.

Start a conversation about your future with an enrollment representative today.

Call (844) 937-8679

Transfer Credits

Credit Transfer

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

How to request your transcripts