1. Education
  2. Courseware

Network Defense

Course Objectives and Learning Outcomes

This course provides an essential study of network defense, related vulnerability and security issues, and common tools available for network packet analysis and exploitations. Topics to be covered include review of basic concepts and principles related to network defense (networking protocols and cryptography, mission assurance, network policy development and enforcement, etc.), secure network development (network access control, DMZs / proxy servers, network hardening, implementing firewalls, VPNs, etc.), and advanced network defense techniques (honeypots, honeynets, network monitoring, implementing IDS/IPS, etc.). The student, after having successfully completed the class, should be able to

  • Understand fundamental security issues in computer networks
  • Understand the common mechanisms used in securing a network
  • Design a TCP/IP network with IP Security
  • Design and deploy firewalls to secure a private network
  • Design and deploy a virtual private network to secure remote connections
  • Select appropriate methods to detect and counter intrusions to a network
  • Understand other advanced issues related to network security
  • View Syllabus of Network Defense Course


    Modules Submodules Units Included
    Network Defense Basics and Principles Network Security Basics Introduction to Network Security
    Network Attacks
    DNS and attacks
    Cryptography
    Services
    Defense Principles Network Defense Principles (Minimizing Exposure, Defense in Depth)
    Network Defense Mechanisms Network Defense Mechanisms (Part 1) Network Access Control
    Firewalls, Proxy Server
    Implementing Firewall, DMZs
    Application-layer security: HTTPS
    Network-layer security: IPSec
    Network Defense Mechanisms (Part 2) Implementing IDS/IPS
    Network Monitoring
    Honeypots and Honeynets
    Network Traffic Analysis
    Policy, Operation and Assurance Network Policy Development and Enforcement
    Network Operational Procedures
    Mission Assurance
    Network Defense Hands-on activities Hands-on Labs Network sniffing using Wireshark
    Implementing IPSec
    Setting up honeypots
    Securing a web server
    Configuring firewall policies