Skip to Main Content Skip to bottom Skip to Chat, Email, Text
"Degrees & Programs"


Computer Network Defense Part 3




Estimated Tuition

4.5 credits

Total credits

45 weeks

Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course provides network training on Computer Network Defense. Introduced topics include wireless defense; traffic monitoring and analysis; network risk and vulnerability management; data backup and recovery; and incident response and management.


CYB/140 - Computer Network Defense Part 2 or equivalent

What you'll learn

Course skills and outcomes

Week 1

  • Describe devices and how they are used in a wireless network. 
  • Examine the different encryption technologies (WEP, WPA, WPA2, etc.). 
  • Interpret the risks and threats associated with a wireless network and mitigation techniques. 
  • Determine methods to detect rogue access points. 

Week 2

  • Summarize network traffic monitoring and some techniques for monitoring. 
  • Determine the importance of baselining normal and suspicious network traffic. 
  • Analyze network traffic signatures. 
  • Explore Wireshark™ and how it can be used to analyze security issues. 

Week 3

  • Examine vulnerability reporting, mitigation, remediation, and verification. 
  • Summarize the phases of risk management, key risk indicators (KRI), and risk frameworks. 
  • Determine requirements for an effective network vulnerability assessment. 
  • Evaluate phases of vulnerability management and precautions of vulnerability management tools. 

Week 4

  • Determine the appropriate backup medium for data backup. 
  • Assess backup methods and best practices (full, differential, and incremental backups). 
  • Compare RAID, SAN, and NAS technologies. 
  • Articulate the recovery drill test on backup data. 

Week 5

  • Elaborate on the importance of finding and addressing vulnerabilities in software, networks, and hardware. 
  • Critique first response activities for network administrators. 
  • Examine the forensics process and the methodology used during an investigation. 
  • Evaluate the Incident Handling and Response (IH&R) process and the roles of the Incident Response Team (IRT). 


Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission ( for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Start a conversation about your future with an enrollment representative today.

Start a conversation about your future with an enrollment representative today.

Call (844) 937-8679

Transfer Credits

Credit Transfer

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

How to request your transcripts