- Design a network topology for a medium to large enterprise, while reading and understanding the fundamental goal of Cyber Security – Confidentiality, Integrity, and Availability (CIA) of data which is transmitted on a given network and governed by federal and state regulations, and procedures.
- Design a network security system which is configured to protect a given network, while reading, researching and considering all elements of Cyber Security such as Physical, Communication, and Network security.
- Design and configure an Intrusion Detection System (IDS), for a typical network for a medium to large enterprise, while using the typical tools and written instructions used by Cyber Security experts to perform network sniffing, monitoring, surveillance, and enumeration of data.
In the process of completing this program, students will learn the following main competencies to succeed in the field of cybersecurity and networking:
- Install switches, routers, and hubs, and configure them while reading instructions that outline specific protocols and addressing procedures which are at risk of intrusion.
- Read, identify, and distinguish the 3 key goals of network security: Confidentiality, Integrity, and Availability (CIA), in a medium to large computer network.
- Implement security policies and standards as required for network protection and security.
- Secure wireless networks, and test for intrusion, as well as configuring for optimal protection such as MAC filtering and traffic encryption.
- Install and configure Intrusion Detection Systems (IDS) to meet the designed and written requirements given the range of threats in any combination of Physical, Network, or Communications elements of a given network.
- Determine “Best Practices” in HTTPS, DNS, SMTP, and FTP servers to “harden” these resources against outside attacks, through research, reading professional journals, and publications.
- Secure a given network using firewalls, and proxy servers, as well as specialized programs and tools.
- Evaluate computer network and information security.
- Assess cybersecurity risk management policies in order to adequately protect an organization’s critical information and assets.
- Evaluate the performance of security systems within an enterprise-level information system.
- Troubleshoot, maintain, and update an enterprise-level information security system.
- Implement continuous network monitoring and provide real-time security solutions.
- Formulate, update, and communicate short- and long-term organizational cybersecurity strategies and policies.