CS 252: Network and Systems Security
The course aims to cover the fundamentals of information security, focusing on critical areas such as network encryption, firewall systems, authentication processes, and auditing and configuration practices.
VIDEO: The CIA Triad
VIDEO: Threats and Vulnerabilities
VIDEO: Risk Management
VIDEO:Defense-in-Depth Example
VIDEO:Introduction to Defense-in-Depth
VIDEO:Threat Terminology
VIDEO:Privacy Threats
VIDEO:Types of Attacks
VIDEO:Zero-Day Exploits
VIDEO:Caller ID Spoofing
Ch 1.1 - Understanding Network Security: Definitions and Core Concepts
Quiz 1.1
Ch 1.2 - Classification of Network Security Measures
Quiz 1.2
Ch 1.3 - Assessment Techniques for Network Security
Quiz 1.3
Ch 1.4 - Common Threats Encountered in Network Security
Quiz 1.4
Ch 1.5 - Crafting Network Security Policies: Procedures and Illustrations
Quiz 1.5
Ch 1.6 - Strategies and Principles for Network Security Architecture
Quiz 1.6
Ch 1.7 - Evaluating Network Security Risks: Guidelines and Methodologies
Quiz 1.7
Ch 1.8 - Identifying Network Security Threats: Categories and Weaknesses
Quiz 1.8
Ch 1.9 - Exploring Security Zones: Purpose and Implementation
Quiz 1.9
Ch 1.10 - Understanding Zero-Day Vulnerabilities in Network Security
Quiz 1.10
VIDEO:Incident Response
VIDEO:Security Control
VIDEO:Security Control Functions
Ch 2.1 - Understanding Information Security: Definitions and Optimal Strategies
Quiz 2.1
Ch 2.2 - Classifying Information Security Measures
Quiz 2.2
Ch 2.3 - Significance of Information Security in Modern Organizations
Quiz 2.3
Ch 2.4 - Implementing Information Security Management Systems
Quiz 2.4
Ch 2.5 - Defining Threats in the Context of Information Security
Quiz 2.5
Ch 2.6 - Unveiling the Concept of Security Policies: Definitions, Instances & Frameworks
Quiz 2.6
Ch 2.7 - Illustrative Examples of Information Security Policies and Procedures
Quiz 2.7
Ch 2.8 - Frameworks and Best Practices for Crafting Information Security Policies
Quiz 2.8
Ch 2.9 - Formulating Information Security Plans: Case Studies and Incident Response Strategies
Quiz 2.9
Ch 2.10 - (Lab 1) Applying Knowledge: Developing an Incident Response Plan Through Practice
VIDEO: Hashing
VIDEO:confidentiality and Nonrepudiation
VIDEO:Cryptographic Authentication
VIDEO:What is Asymmetric Encryption?
VIDEO:DES
VIDEO: AES Complete Explanation
VIDEO:Public Key Cryptography RSA Encryption Algorithm
VIDEO:Cryptographic Hash
VIDEO:Public-key Infrastructure (PKI)
VIDEO:More on Public-key Infrastructure (PKI)
Ch 3.1 - Understanding Cryptography: Definitions and Applications
Quiz 3.1
Ch 3.2 - Tracing the Evolution of Encryption Techniques
Quiz 3.2
Ch 3.3 - Fundamentals of Basic Encryption Methods
Quiz 3.3
Ch 3.4 - Delving into the Advanced Encryption Standard (AES): Concepts and Overview
Quiz 3.4
Ch 3.5 - Exploring the Data Encryption Standard (DES)
Quiz 3.5
Ch 3.6 - Symmetric Encryption Demystified: Concepts and Illustrations
Quiz 3.6
Ch 3.7 - Unveiling the RSA Algorithm: Encryption Principles and Applications
Quiz 3.7
Ch 3.8 - Comparing IPsec and SSL Protocols for Secure Communications
Quiz 3.8
Ch 3.9 - Securing Web Communication with HTTPS Encryption
Quiz 3.9
Ch 3.10 - Analyzing the Differences Between WPA and WPA2 Encryption Standards
Quiz 3.10
Ch 3.11 - Contrasting WPA and WEP Encryption Protocols
Quiz 3.11
Ch 3.12 - Introduction to Public Key Encryption: Concepts and Examples
Quiz 3.12
VIDEO:Firewall Basics and Firewall Placement
VIDEO:Inbound and Outbound Packet Processing
VIDEO:Deep Packet Inspection and Routers
VIDEO:Type of DoS and DDoS Attacks
VIDEO:Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)
VIDEO:Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Ch 4.1 - Network Security Measures: Exploring Firewalls, Encryption, Authentication, and Biometrics
Quiz 4.1
Ch 4.2 - Understanding Firewalls in Network Security: Roles and Applications
Quiz 4.2
Ch 4.3 - Comprehensive Overview of Firewalls: Features and Operational Functions
Quiz 4.3
Ch 4.4 - Demystifying Communication Protocols: TCP/IP and Its Functionality
Quiz 4.4
Ch 4.5 - Deciphering Internet Packets: Definitions and Insights
Quiz 4.5
Ch 4.6 - Analysis, Management, and Monitoring of Network Nodes: Tools and Techniques
Quiz 4.6
Ch 4.7 - Unveiling Spoofing Attacks: Definitions, Variants, and Countermeasures
Quiz 4.7
Ch 4.8 - Navigating the OSI Model: Utilizing Open Systems Interconnection for Data Transmission
Quiz 4.8
Ch 4.9 - Exploring the Application Layer of the OSI Model: Functions, Protocols, and Implementations
Quiz 4.9
Ch 4.10 - Integration of Communication and Wireless Computing Devices: GPS, PDAs, Cellular, and Satellite Technologies
Quiz 4.10
Ch 4.11 - Secure Communication with SSH Proxy Tunnels: Principles and Deployment
Quiz 4.11
Ch 4.12 - Components of Telecommunications Systems: Essential Elements and Configurations
Quiz 4.12
VIDEO:Introduction to Wireless Networks and Wireless Encryption
VIDEO:Wireless Network Basics
VIDEO:Packet Capturing Using tcpdump and Wireshark
Ch 5.1 - Exploring Wireless Equivalent Privacy (WEP) Network Security
Quiz 5.1
Ch 5.2 - Implementing Robust Security Measures for Wireless Networks
Quiz 5.2
Ch 5.3 - Understanding Wireless Transmission Characteristics: Components and Real-World Examples
Quiz 5.3
Ch 5.4 - Short-Range Wireless Communication Technologies: Bluetooth, ZigBee, and Infrared Transmission
Quiz 5.4
Ch 5.5 - Medium-Range Wireless Communication Technologies: Wi-Fi and Hotspot Deployment
Quiz 5.5
Ch 5.6 - Analysis of Wide Area Network (WAN) Topologies in Wireless Networks
Quiz 5.6
Ch 5.7 - Comprehensive Overview of Wireless Protected Access (WPA) Security Protocol
Quiz 5.7
Ch 5.8 - Comparative Analysis of WPA2 AES vs. TKIP Encryption Methods
Quiz 5.8
Ch 5.9 - Exploring Wi-Fi Encryption Standards: Types, Security Measures, and Compliance
Quiz 5.9
Ch 5.10 - Comprehensive Examination of WLAN Protocols: Types and Operational Characteristics
Quiz 5.10
Ch 5.11 - Unveiling Radio Frequency Identification (RFID): Definitions, Applications, and Implications
Quiz 5.11
Ch 5.12 - Identifying and Resolving Wireless Network Security Challenges and Solutions
Quiz 5.12
Ch 5.13 - (Lab 2) Practical Application: Securing Wireless Networks through Hands-On Exercises
VIDEOS:Types of Application Attacks
VIDEO:Common Types of Malware
VIDEO:Malware Functions
VIDEO:The Security Risks of Viruses, Worms, and Trojan Horses
VIDEO:Denial of Service (DOS)
VIDEO:Distributed Denial of Service (DDoS)
VIDEO:Type of DoS and DDoS Attacks
VIDEO:Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)
VIDEO:Secure Sockets Layer (SSL) and Transport Layer Security (TLS
VIDEO:Domain Name System (DNS) and Domain Name System Security extensions (DNSSEC)
VIDEO:SSH Protocols
VIDEO:SSH vs. FTP
Ch 6.1 - The Internet Unveiled: Definitions, Evolution, and Functionality
Quiz 6.1
Ch 6.2 - Deciphering Hypertext Transfer Protocol (HTTP): Functions and Real-World Applications
Quiz 6.2
Ch 6.3 - Understanding Simple Mail Transfer Protocol (SMTP): Functions and Operational Uses
Quiz 6.3
Ch 6.4 - Exploring Post Office Protocol (POP): Definitions and Functional Overview
Quiz 6.4
Ch 6.5 - Insights into Internet Message Access Protocol (IMAP): Definitions and Practical Applications
Quiz 6.5
Ch 6.6 - Demystifying File Transfer Protocol (FTP): Functions, Mechanisms, and Security Implications
Quiz 6.6
Ch 6.7 - Comparative Analysis: Telnet vs. Secure Shell (SSH) for Remote Access Security
Quiz 6.7
Ch 6.8 - Delving into Service-Oriented Architecture (SOA) vs. Client-Server Architecture: Architectural Paradigms and Security Considerations
Quiz 6.8
Ch 6.9 - Web Development Essentials: HTML, XHTML, XML, CSS, and JavaScript for Secure Web Page Design and Programming
Quiz 6.9
Ch 6.10 - Navigating the Transport Layer of the OSI Model: Functions, Security Mechanisms, and Protocol Analysis
Quiz 6.10
Ch 6.11 - Understanding Denial of Service (DoS) Attacks: Definitions, Variants, and Case Studies
Quiz 6.11
Ch 6.12 - Mobile Device Security: Threats, Risks, and Challenges in the Mobile Ecosystem
Quiz 6.12
Ch 6.13 - Analyzing Mobile Malware: Detection Techniques and Countermeasures for Mobile Security
Quiz 6.13
We’ll help you check. UPI Study courses are ACE & NCCRS-recommended, and students have successfully transferred credits to 1733+ universities. You can check your college in our list so you can move forward with confidence or schedule a call.
Step 1
Start one or more courses covering lower or upper division requirements. Great for completing your degree.
Step 2
Complete courses by watching fun video lessons, taking short quizzes and the final exam, all from home.
Step 3
Send transcript and transfer earned college credits to your university and graduate sooner, and at a fraction of the cost.
Select your course and click Enroll Today.
Create your account and complete checkout.
Start earning affordable college credits.
All Courses, Computer Science, ACE Courses, NCCRS Courses
The course objective is to introduce students to the basics of cybersecurity and cybercrime. Learn about cybersecurity policies and procedures, the impact of cybercrime on communication, cryptography, operating system and network security.
All Courses, Computer Science, NCCRS Courses
This course teaches the basic operating system abstractions, mechanisms, & implementations. The core of the course contains concurrent programming (threads & synchronization), inter-process communication, & an intro to distributed operating systems.
All Courses, Computer Science, NCCRS Courses
In this introduction to networking, learn how computer networks work, the architecture used to design networks, and how to keep them secure.
Invite a friend to join UPI and help them cut their college costs from day one. They save big, you earn up to $200 cashback — everyone wins, and it takes less than a minute to share.
Speak directly with a UPI Study advisor to understand how our transferable online college credits work, whether your university accepts them, and how to move forward with confidence.
Get quick answers about ACE & NCCRS-recommended credits, course selection, pricing, and transfer policies through WhatsApp support.
Prefer SMS? Text UPI Study to get help with enrollment, exams, self-paced online courses, and how to transfer credits to your university.
Explore in-depth guides on testing out of college courses, transfer credit policies, ACE evaluations, and ways to save on tuition.
General Questions
UPI Study courses are fully self-paced, meaning you control your time commitment.
You can:
Move quickly to test out of course material if you’re confident
Slow down and study at a comfortable pace if needed
Fit coursework around work, school, or personal responsibilities
This flexibility makes UPI Study ideal for students looking to earn college credit online, finish requirements faster, or balance learning with other commitments.
Yes, UPI Study courses include online exams, which are conducted securely on our platform and are proctored to meet academic standards.
Your final course grade is evenly distributed as follows:
25% Attendance
25% Quizzes
25% Assignments
25% Final Exam
This balanced grading structure ensures that students are evaluated fairly across participation, coursework, and exams—similar to traditional college classes, but with the flexibility of online learning.
Content Questions
To confirm whether your university will accept UPI Study’s transferable online college credits, you can check one of the following:
1) Verify if your university is listed
UPI Study courses carry NCCRS credit recommendations, and credits have already been reviewed by 1,500+ colleges and universities. If your school appears on the NCCRS list, your credits are very likely transferable.
OR
2) Review your university’s transfer credit policy
Many universities state that they accept credits from regionally accredited institutions or from ACE/NCCRS-evaluated coursework. If your university’s policy includes this language, UPI Study credits typically qualify for review and transfer.
As long as you meet either of these criteria, your credits can usually be transferred without issue.
Check the list of colleges here.
Membership Questions
Yes — this is one of the key differences with UPI Study.
Each student is assigned an academic advisor who helps guide them through the credit transfer process, including:
Understanding your university’s transfer policy
Preparing the right documents and transcripts
Knowing when and how to submit credits for evaluation
This level of hands-on support is designed to make transferring online college credits as smooth and stress-free as possible.
UPI Study offers a completely online learning experience, free from the high costs of traditional colleges and universities. By cutting out the institutional overhead, we pass the savings onto you (instead of extra costs) — providing top-quality courses at a price that fits with your budget
Quick answers about transferable online college credits, test-out style learning, and ACE & NCCRS-recommended credit options through UPI Study.
UPI Study offers transferable online college credits that are evaluated by universities across the
United States, Canada, and the UK. Our official transcripts have been reviewed by
2,100+ colleges and universities, and many students transfer credits toward
general education or elective requirements.
In Short - Many learners use UPI Study to test out of college courses and move faster without paying full tuition.
Anyone can enroll — including high school students, incoming college students,
adult learners, and students trying to test out of traditional college courses.
UPI Study is built for self-paced online college courses so you can finish on your schedule.
In Short - If you’re searching for a faster way to earn transfer credits to your university, this is one of the simplest options.
Taking self-paced online college credits can help you save time and reduce tuition costs
versus traditional on-campus classes. Many students use UPI Study to complete prerequisites faster and shorten
their time to graduation while still earning transferable college credit.
In Short - For students looking to test out or finish general education requirements quickly, this is often the most efficient path.
Many UPI Study courses are ACE-recommended and NCCRS-recommended, commonly for
3 semester credit hours per course. Your university registrar makes the final decision, but schools often
evaluate UPI Study credits similarly to other ACE credit recommendation options.
In Short -If you’re searching for ACE recommended college credit or NCCRS credit recommendation, these keywords match exactly how registrars review transfer credit.