Network Security - Protocols

Prerequisites: This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.Information Security - Introduction to Information SecurityInformation Security - Authentication and Access ControlInformation Security - Advanced TopicsNetwork Security - Introduction to Network SecurityNetwork Security - ProtocolsNetwork Security - Advanced TopicsPenetration Testing - Discovering VulnerabilitiesPenetration Testing - ExploitationPenetration Testing - Post ExploitationThese topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor. Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. 5 Weeks 8-10 Hours per week recommended
5992

Please select the start dates for your courses below.

Scheduled Start:

About This Course:

This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Define and apply a substitution cipherDefine cryptanalysisExplain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.Describe at least two strategies for breaking an encryption schemeIdentify the differences between public key encryption, symmetric key encryption, and hashingList and summarize the characteristics of good ciphersDescribe the vulnerabilities of stream ciphersDefine AES and explain why it is recommended over 3DESDefine cipher block chainingList the steps in creating an RSA public/private key pairExplain why RSA is secureDefine message integrity and explain how it is ensuredDefine IPSec and list its servicesDefine authentication header and ESPExplain the primary goal of IKE and describe its sub-protocolsSummarize the five steps of IPSec OperationSummarize the history of SSLExplain how closure alerts can prevent a truncation attackIdentify the protocols that make up the SSL architectureDescribe how SSL/TLS provides protected channelsState the differences between IPSec and SSL VPN connectionsExplain why it’s important to consider Layer 2 securityDefine common Layer 2 attacksIdentify tools used in Layer 2 attacksDescribe countermeasures to Layer 2 attacks and security best practices to prevent attacksExplain the differences between the 2.4GHz and 5GHz spectrumsProvide definitions of basic wireless termsExplain how 802.11ac differs from earlier 802.11 standardsIdentify and define the types of 802.11 framesList and define the states of 802.11 sessionsList the steps in establishing an 802.11 sessionSummarize the existing wireless security protocols and state which protocols should not be usedSummarize WPA, WPA Enterprise, and generalized WiFi attacks

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year
5992

Duration

5 weeks

Experience Level

Intermediate

Learning Partner

New York University (NYUx)

Pacing

Self-paced

Subject

Computer Science