MSCS: CYB 501 – Network Security
Categories: MS in Computer Science
About Course
- This course provides an in-depth exploration of the principles and practices of network security, focusing on the latest techniques for defending against network attacks.
- Students will learn about various security protocols, network architectures, and methodologies for identifying and mitigating threats in networked systems.
- The course emphasizes practical skills and the application of security strategies in real-world scenarios.
Course Objectives
- Understand the foundational principles of network security, including encryption, firewalls, and intrusion detection systems.
- Analyze and apply security protocols and architectures to protect network communications.
- Develop skills to identify and mitigate vulnerabilities in networked systems.
- Evaluate and implement strategies for defending against various types of network attacks, including DDoS, malware, and phishing.
Course Content
Week 1: Introduction to Network Security
-
Introduction to Network Security
00:00 -
LO1: Describe the fundamental concepts of network security and the components of the current threat landscape.
00:00 -
LO2: Explain core security principles such as confidentiality, integrity, and availability as related to network systems.
00:00 -
LO3: Identify common network vulnerabilities and categorize different types of threats.
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 2: Cryptography and Network Security
-
Cryptography and Network Security
00:00 -
LO1: Explain how symmetric and asymmetric encryption techniques protect network communication
00:00 -
LO2: Analyze key management processes and their role in maintaining secure communication channels
00:00 -
LO3: Apply cryptographic protocols to illustrate secure data exchange in networks
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 3: Network Security Protocols
-
Network Security Protocols
00:00 -
LO1: Describe the structure and functions of SSL/TLS, IPSec, and secure email protocols.
-
LO2: Compare different network security protocols in terms of authentication, confidentiality, and integrity features.
-
LO3: Evaluate the suitability of specific protocols for protecting various types of network communications
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 4: Firewalls and Intrusion Detection Systems
-
Firewalls and Intrusion Detection Systems
00:00 -
LO1: Explain the different types of firewalls and their filtering mechanisms
-
LO2: Analyze how IDS/IPS tools detect and prevent malicious activities within a network
-
LO3: Configure basic firewall rules and interpret intrusion detection alerts in practical scenarios
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 5: Securing Wireless Networks
-
Securing Wireless Networks
00:00 -
LO1: Describe wireless security standards and their evolution.
-
LO2: Analyze common vulnerabilities in Wi-Fi networks and how attackers exploit them.
-
LO3: Apply recommended security controls to design a secure wireless network configuration
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 6: Virtual Private Networks (VPNs)
-
Virtual Private Networks (VPNs)
00:00 -
LO1: Explain VPN architectures and tunneling mechanisms such as IPSec and SSL VPNs.
-
LO2: Evaluate the security advantages and limitations of site-to-site and remote-access VPNs.
-
LO3: Implement sample VPN configurations to demonstrate encrypted communication over public networks.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 7: Network Attack Vectors
-
Network Attack Vectors
00:00 -
LO1: Identify major network-based attacks such as DDoS, malware propagation, and phishing.
-
LO2: Analyze real-world attack scenarios to understand attacker behavior and techniques.
-
LO3: Evaluate mitigation strategies for different attack vectors based on security best practices.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 8: Midterm
-
Midterm
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 9: Incident Response and Management
-
Incident Response and Management
00:00 -
LO1: Describe the phases of an incident response lifecycle according to industry frameworks.
-
LO2: Analyze security incident data to determine the nature and impact of a breach.
-
LO3: Develop an incident response plan including containment, eradication, and recovery steps.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 10: Security in Cloud Networks
-
Security in Cloud Networks
00:00 -
LO1: Explain different cloud security models (IaaS, PaaS, SaaS) and shared responsibility frameworks.
-
LO2: Analyze cloud risks such as misconfigurations, API vulnerabilities, and data exposure.
-
LO3: Propose cloud security controls such as IAM policies, encryption, and segmentation.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 11: Penetration Testing
-
Penetration Testing
00:00 -
LO1: Describe the methodology of ethical hacking and vulnerability assessment
-
LO2: Use penetration testing tools to identify security weaknesses in networks.
-
LO3: Evaluate discovered vulnerabilities and recommend remediation strategies.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 12: Advanced Threat Detection
-
Advanced Threat Detection
00:00 -
LO1: Explain how behavioral analytics and machine learning enhance modern threat detection systems.
00:00 -
LO2: Analyze case studies of advanced threats to understand detection challenges.
00:00 -
LO3: Assess the effectiveness of next-generation security tools in identifying emerging attacks.
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 13: Compliance and Legal Issues in Network Security
-
Compliance and Legal Issues in Network Security
-
LO1: Describe major standards and regulations such as GDPR, HIPAA, and ISO 27001.
00:00 -
LO2: Analyze compliance requirements and their implications for organizational security practices.
00:00 -
LO3: Evaluate the role of legal and ethical considerations in implementing network security controls.
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 14: Recent Trends in Network Security
-
Recent Trends in Network Security
-
LO1: Summarize emerging threats and technologies, including AI-driven attacks and automated defense systems.
00:00 -
LO2: Analyze cutting-edge security research to identify gaps in current defense mechanisms.
00:00 -
LO3: Evaluate how advancements in AI and automation reshape modern network security strategies
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 15: Review and Open Problems in Network Security
-
Review and Open Problems in Network Security
-
LO1: Integrate knowledge from previous weeks to form a comprehensive understanding of network defense.
00:00 -
LO2: Analyze open research challenges such as zero-trust networking and encrypted traffic inspection.
00:00 -
LO3: Evaluate potential future directions in the field based on current trends and literature.
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 16: Final Test
-
Final Review
00:00 -
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation