CMIT 320: Network Security

(UMGC-CMIT320.AI1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction

2

Security fundamentals

  • Module A: Security concepts
  • Module B: Enterprise security strategy
  • Module C: Security program components
  • Summary
3

Risk management

  • Module A: Understanding threats
  • Module B: Risk management programs
  • Module C: Security assessments
  • Summary
4

Cryptography

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure
  • Summary
5

Network connectivity

  • Module A: Network attacks
  • Module B: Packet flow
  • Summary
6

Network security technologies

  • Module A: Network security components
  • Module B: Monitoring tools
  • Summary
7

Secure network configuration

  • Module A: Secure network protocols
  • Module B: Hardening networks
  • Summary
8

Authentication

  • Module A: Authentication factors
  • Module B: Authentication protocols
  • Summary
9

Access control

  • Module A: Access control principles
  • Module B: Account management
  • Summary
10

Securing hosts and data

  • Module A: Malware
  • Module B: Securing data
  • Module C: Securing hosts
  • Summary
11

Securing specialized systems

  • Module A: Mobile security
  • Module B: Embedded and specialized systems
  • Summary
12

Application security

  • Module A: Application attacks
  • Module B: Securing applications
  • Summary
13

Cloud security

  • Module A: Virtual and cloud systems
  • Module B: Securing cloud services
  • Summary
14

Organizational security

  • Module A: Social engineering
  • Module B: Security policies
  • Module C: User roles and training
  • Module D: Physical security and safety
  • Summary
15

Disaster planning and recovery

  • Module A: Business continuity
  • Module B: Resilient systems
  • Module C: Incident response procedures
  • Summary

1

Risk management

  • Using Reconnaissance Tools
  • Gathering Site Information
  • Performing Session Hijacking Using Burp Suite
  • Footprinting a Website
  • Cracking a Linux Password Using John the Ripper
  • Using the hping Program
  • Using the theHarvester Tool to Gather Information about a Victim
  • Conducting Vulnerability Scanning Using Nessus
2

Cryptography

  • Observing an MD5-Generated Hash Value
  • Observing an SHA-Generated Hash Value
  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
  • Hiding Text Using Steganography
  • Examining PKI Certificates
3

Network connectivity

  • Simulating a DoS Attack
  • Using Rainbow Tables to Crack Passwords
  • Performing ARP Spoofing
  • Defending against IP Spoofing
  • Simulating an Eavesdropping Attack
  • Cracking Passwords
  • Using Windows Firewall
  • Configuring the Network-based Firewall
  • Configuring a BPDU Guard on a Switch Port
  • Implementing Port Security
  • Configuring a Standard ACL
  • Configuring Network Address Translation
4

Network security technologies

  • Setting up a Honeypot on Kali Linux
  • Examining File Manipulation Commands
  • Making Syslog Entries Readable
  • Capturing the TCP Header with Wireshark
  • Using Event Viewer
  • Viewing Linux event logs
5

Secure network configuration

  • Setting Up a VPN Server with Windows Server 2016
  • Creating PGP Certification
  • Securing a Wi-Fi Hotspot
  • Performing a Scan in Zenmap
  • Configuring VLANs
6

Authentication

  • Installing a RADIUS Server
  • Examining Kerberos Settings
7

Access control

  • Creating Active Directory Groups
  • Delegating Control in Active Directory
  • Creating a Domain User
  • Enforcing Password Policies
8

Securing hosts and data

  • Using an Anti-Spyware Tool
  • Managing NTFS Permissions
  • Configuring Lockout Policies
  • Using the chmod Command
  • Creating a Security Template
9

Securing specialized systems

  • Setting Up a VPN in Android
10

Application security

  • Defending Against a Buffer Overflow Attack
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
11

Organizational security

  • Using Anti-phishing Tools
  • Using Social Engineering Techniques to Plan an Attack

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top