CYB/150
Computer Network Defense Part 3
Online
Format
$1194
Estimated Tuition
4.5 credits
Total credits
45 weeks
Course length
Start when you're ready
Choose an upcoming start date:
Enroll by 1pm Central:
Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.
Course level: Undergraduate
This course provides network training on Computer Network Defense. Introduced topics include wireless defense; traffic monitoring and analysis; network risk and vulnerability management; data backup and recovery; and incident response and management.
Prerequisites
CYB/140 - Computer Network Defense Part 2 or equivalent
What you'll learn
Course skills and outcomes
Week 1
- Describe devices and how they are used in a wireless network.
- Examine the different encryption technologies (WEP, WPA, WPA2, etc.).
- Interpret the risks and threats associated with a wireless network and mitigation techniques.
- Determine methods to detect rogue access points.
Week 2
- Summarize network traffic monitoring and some techniques for monitoring.
- Determine the importance of baselining normal and suspicious network traffic.
- Analyze network traffic signatures.
- Explore Wireshark™ and how it can be used to analyze security issues.
Week 3
- Examine vulnerability reporting, mitigation, remediation, and verification.
- Summarize the phases of risk management, key risk indicators (KRI), and risk frameworks.
- Determine requirements for an effective network vulnerability assessment.
- Evaluate phases of vulnerability management and precautions of vulnerability management tools.
Week 4
- Determine the appropriate backup medium for data backup.
- Assess backup methods and best practices (full, differential, and incremental backups).
- Compare RAID, SAN, and NAS technologies.
- Articulate the recovery drill test on backup data.
Week 5
- Elaborate on the importance of finding and addressing vulnerabilities in software, networks, and hardware.
- Critique first response activities for network administrators.
- Examine the forensics process and the methodology used during an investigation.
- Evaluate the Incident Handling and Response (IH&R) process and the roles of the Incident Response Team (IRT).