cyb150 | undergraduate

Computer Network Defense Part 3

Explore by:

or call us at



This course provides continued network training on Computer Network Defense. Introduced topics include physical security, designing and implementing network security policies, network incident response and management, network backup and disaster recovery, and wireless defense.

This undergraduate-level course is 5 This course is available to take individually or To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5

topic title goes here

    Introduction to Wireless Network Defense

    • Describe devices and how they are used in a wireless network.
    • Examine the different encryption technologies (WEP, WPA, WPA2, etc.).
    • Interpret the risks and threats associated with a wireless network and mitigation techniques.
    • Determine methods to detect rogue access points.

    Network Traffic Monitoring and Analysis

    • Summarize network traffic monitoring and some techniques for monitoring.
    • Determine the importance of baselining normal and suspicious network traffic.
    • Analyze network traffic signatures.
    • Explore Wireshark™ and how it can be used to analyze security issues.

    Network Risk and Vulnerability Management

    • Examine vulnerability reporting, mitigation, remediation, and verification.
    • Summarize the phases of risk management, key risk indicators (KRI), and risk frameworks.
    • Determine requirements for an effective network vulnerability assessment.
    • Evaluate phases of vulnerability management and precautions of vulnerability management tools.

    Data Backup and Recovery

    • Determine the appropriate backup medium for data backup.
    • Assess backup methods and best practices (full, differential, and incremental backups).
    • Compare RAID, SAN, and NAS technologies.
    • Articulate the recovery drill test on backup data.

    Network Incident Response and Management

    • Elaborate on the importance of finding and addressing vulnerabilities in software, networks, and hardware.
    • Critique first response activities for network administrators.
    • Examine the forensics process and the methodology used during an investigation.
    • Evaluate the Incident Handling and Response (IH&R) process and the roles of the Incident Response Team (IRT).
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.