Computer Network Defense Part 2
Start when you're ready
Choose an upcoming start date:
Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.
Course level: Undergraduate
This course provides network training on Computer Network Defense. Introduced topics include physical and host security; firewall configuration and management; Intrusion Detection Systems (IDS) and Virtual Private Network (VPN) configuration and management.
CYB/120 - Computer Network Defense Part 1 or equivalent
What you'll learn
Course skills and outcomes
- Determine the need for physical security of systems and networks.
- Compare various physical security controls.
- Describe the threats specific to individual hosts.
- Describe the minimum-security baseline requirements for various operating systems (Windows, Mac, Linux).
- Describe and contrast the minimum-security baseline requirements for different types of servers.
- Describe and contrast the minimum-security baseline requirements for different types of applications.
- Identity the unique security baseline requirements for virtualized hosts.
- Compare standard host security requirements.
- Analyze five different types of firewalls and their respective strengths and weaknesses.
- Detail the steps to configure a firewall.
- Evaluate how to deploy and manage the appropriate firewall solution for a network.
- Describe the different types of intrusions.
- Distinguish how intrusion-prevention and intrusion-detection systems are designed and operate.
- Illustrate deployment strategies for preventing and detecting intrusion.
- Describe the role of wireless intrusion prevention systems.
- Examine various VPN configurations, such as PPTP and L2TP.
- Illustrate the protection mechanisms that a VPN provides.
- Elaborate on how a typical VPN is configured and deployed within a network.