Network Security CNSS 260

This course covers the skills needed to protect computer systems, network systems, and information assets (information assurance). Students will apply the latest methods, with a focus on information system security protection. Understanding key elements like the "Human Firewall" are explored in depth. Prerequisite: CNSS-220; and Student must pass a criminal background check.

Correlated Learning Outcomes

  • IT. 9. Use a variety of practices for making end-user IT systems secure.
  • IT. 14. Discuss issues relevant to dealing with very large data sets, both structured and unstructured.
  • IT. 23. Describe the layers, protocols and components of the OSI model.
  • IT. 26. Differentiate among various techniques for making a computer network secure.
  • IT. 28. Demonstrate best practices for designing end-user computing interfaces.
  • IT. 30. Diagram the phases of the Secure Software Development Lifecycle.
  • IT. 31. Discuss software development methodologies.
  • IT. 33. Use a programming or a scripting language to share data across an integrated IT system.
  • IT. 34. Use a programming or a scripting language to solve a problem.
  • IT. 38. Implement an application of virtualization.
  • IT. 39. Modify a system to improve data confidentiality or regulatory compliance.
  • IT. 40. Summarize the implications of various cloud computing models.
  • IT. 41. Summarize the security implications and risks for distributed IT systems.
  • IT. 43. Describe the attitudes, knowledge and abilities associated with quality customer service.
  • IT. 44. Produce technical documentation responsive to an identified computing scenario
  • IT. 45. Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario.
  • IT. 46. Discuss significant trends and emerging technologies and their impact on global society.
  • IT. 47. Demonstrate professional behavior in response to an ethically-challenging scenario in computing.
  • IT. 48. Summarize the tenets of ethics and professional behavior promoted by international computing societies.
  • IT. 50. Summarize the role of IT in supporting the mission and goals of an organization.