CS 252: Network and Systems Security
The course aims to cover the fundamentals of information security, focusing on critical areas such as network encryption, firewall systems, authentication processes, and auditing and configuration practices.
VIDEO: The CIA Triad
VIDEO: Threats and Vulnerabilities
VIDEO: Risk Management
VIDEO:Defense-in-Depth Example
VIDEO:Introduction to Defense-in-Depth
VIDEO:Threat Terminology
VIDEO:Privacy Threats
VIDEO:Types of Attacks
VIDEO:Zero-Day Exploits
VIDEO:Caller ID Spoofing
Ch 1.1 - Understanding Network Security: Definitions and Core Concepts
Quiz 1.1
Ch 1.2 - Classification of Network Security Measures
Quiz 1.2
Ch 1.3 - Assessment Techniques for Network Security
Quiz 1.3
Ch 1.4 - Common Threats Encountered in Network Security
Quiz 1.4
Ch 1.5 - Crafting Network Security Policies: Procedures and Illustrations
Quiz 1.5
Ch 1.6 - Strategies and Principles for Network Security Architecture
Quiz 1.6
Ch 1.7 - Evaluating Network Security Risks: Guidelines and Methodologies
Quiz 1.7
Ch 1.8 - Identifying Network Security Threats: Categories and Weaknesses
Quiz 1.8
Ch 1.9 - Exploring Security Zones: Purpose and Implementation
Quiz 1.9
Ch 1.10 - Understanding Zero-Day Vulnerabilities in Network Security
Quiz 1.10
VIDEO:Incident Response
VIDEO:Security Control
VIDEO:Security Control Functions
Ch 2.1 - Understanding Information Security: Definitions and Optimal Strategies
Quiz 2.1
Ch 2.2 - Classifying Information Security Measures
Quiz 2.2
Ch 2.3 - Significance of Information Security in Modern Organizations
Quiz 2.3
Ch 2.4 - Implementing Information Security Management Systems
Quiz 2.4
Ch 2.5 - Defining Threats in the Context of Information Security
Quiz 2.5
Ch 2.6 - Unveiling the Concept of Security Policies: Definitions, Instances & Frameworks
Quiz 2.6
Ch 2.7 - Illustrative Examples of Information Security Policies and Procedures
Quiz 2.7
Ch 2.8 - Frameworks and Best Practices for Crafting Information Security Policies
Quiz 2.8
Ch 2.9 - Formulating Information Security Plans: Case Studies and Incident Response Strategies
Quiz 2.9
Ch 2.10 - (Lab 1) Applying Knowledge: Developing an Incident Response Plan Through Practice
VIDEO: Hashing
VIDEO:confidentiality and Nonrepudiation
VIDEO:Cryptographic Authentication
VIDEO:What is Asymmetric Encryption?
VIDEO:DES
VIDEO: AES Complete Explanation
VIDEO:Public Key Cryptography RSA Encryption Algorithm
VIDEO:Cryptographic Hash
VIDEO:Public-key Infrastructure (PKI)
VIDEO:More on Public-key Infrastructure (PKI)
Ch 3.1 - Understanding Cryptography: Definitions and Applications
Quiz 3.1
Ch 3.2 - Tracing the Evolution of Encryption Techniques
Quiz 3.2
Ch 3.3 - Fundamentals of Basic Encryption Methods
Quiz 3.3
Ch 3.4 - Delving into the Advanced Encryption Standard (AES): Concepts and Overview
Quiz 3.4
Ch 3.5 - Exploring the Data Encryption Standard (DES)
Quiz 3.5
Ch 3.6 - Symmetric Encryption Demystified: Concepts and Illustrations
Quiz 3.6
Ch 3.7 - Unveiling the RSA Algorithm: Encryption Principles and Applications
Quiz 3.7
Ch 3.8 - Comparing IPsec and SSL Protocols for Secure Communications
Quiz 3.8
Ch 3.9 - Securing Web Communication with HTTPS Encryption
Quiz 3.9
Ch 3.10 - Analyzing the Differences Between WPA and WPA2 Encryption Standards
Quiz 3.10
Ch 3.11 - Contrasting WPA and WEP Encryption Protocols
Quiz 3.11
Ch 3.12 - Introduction to Public Key Encryption: Concepts and Examples
Quiz 3.12
VIDEO:Firewall Basics and Firewall Placement
VIDEO:Inbound and Outbound Packet Processing
VIDEO:Deep Packet Inspection and Routers
VIDEO:Type of DoS and DDoS Attacks
VIDEO:Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)
VIDEO:Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Ch 4.1 - Network Security Measures: Exploring Firewalls, Encryption, Authentication, and Biometrics
Quiz 4.1
Ch 4.2 - Understanding Firewalls in Network Security: Roles and Applications
Quiz 4.2
Ch 4.3 - Comprehensive Overview of Firewalls: Features and Operational Functions
Quiz 4.3
Ch 4.4 - Demystifying Communication Protocols: TCP/IP and Its Functionality
Quiz 4.4
Ch 4.5 - Deciphering Internet Packets: Definitions and Insights
Quiz 4.5
Ch 4.6 - Analysis, Management, and Monitoring of Network Nodes: Tools and Techniques
Quiz 4.6
Ch 4.7 - Unveiling Spoofing Attacks: Definitions, Variants, and Countermeasures
Quiz 4.7
Ch 4.8 - Navigating the OSI Model: Utilizing Open Systems Interconnection for Data Transmission
Quiz 4.8
Ch 4.9 - Exploring the Application Layer of the OSI Model: Functions, Protocols, and Implementations
Quiz 4.9
Ch 4.10 - Integration of Communication and Wireless Computing Devices: GPS, PDAs, Cellular, and Satellite Technologies
Quiz 4.10
Ch 4.11 - Secure Communication with SSH Proxy Tunnels: Principles and Deployment
Quiz 4.11
Ch 4.12 - Components of Telecommunications Systems: Essential Elements and Configurations
Quiz 4.12
VIDEO:Introduction to Wireless Networks and Wireless Encryption
VIDEO:Wireless Network Basics
VIDEO:Packet Capturing Using tcpdump and Wireshark
Ch 5.1 - Exploring Wireless Equivalent Privacy (WEP) Network Security
Quiz 5.1
Ch 5.2 - Implementing Robust Security Measures for Wireless Networks
Quiz 5.2
Ch 5.3 - Understanding Wireless Transmission Characteristics: Components and Real-World Examples
Quiz 5.3
Ch 5.4 - Short-Range Wireless Communication Technologies: Bluetooth, ZigBee, and Infrared Transmission
Quiz 5.4
Ch 5.5 - Medium-Range Wireless Communication Technologies: Wi-Fi and Hotspot Deployment
Quiz 5.5
Ch 5.6 - Analysis of Wide Area Network (WAN) Topologies in Wireless Networks
Quiz 5.6
Ch 5.7 - Comprehensive Overview of Wireless Protected Access (WPA) Security Protocol
Quiz 5.7
Ch 5.8 - Comparative Analysis of WPA2 AES vs. TKIP Encryption Methods
Quiz 5.8
Ch 5.9 - Exploring Wi-Fi Encryption Standards: Types, Security Measures, and Compliance
Quiz 5.9
Ch 5.10 - Comprehensive Examination of WLAN Protocols: Types and Operational Characteristics
Quiz 5.10
Ch 5.11 - Unveiling Radio Frequency Identification (RFID): Definitions, Applications, and Implications
Quiz 5.11
Ch 5.12 - Identifying and Resolving Wireless Network Security Challenges and Solutions
Quiz 5.12
Ch 5.13 - (Lab 2) Practical Application: Securing Wireless Networks through Hands-On Exercises
VIDEOS:Types of Application Attacks
VIDEO:Common Types of Malware
VIDEO:Malware Functions
VIDEO:The Security Risks of Viruses, Worms, and Trojan Horses
VIDEO:Denial of Service (DOS)
VIDEO:Distributed Denial of Service (DDoS)
VIDEO:Type of DoS and DDoS Attacks
VIDEO:Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)
VIDEO:Secure Sockets Layer (SSL) and Transport Layer Security (TLS
VIDEO:Domain Name System (DNS) and Domain Name System Security extensions (DNSSEC)
VIDEO:SSH Protocols
VIDEO:SSH vs. FTP
Ch 6.1 - The Internet Unveiled: Definitions, Evolution, and Functionality
Quiz 6.1
Ch 6.2 - Deciphering Hypertext Transfer Protocol (HTTP): Functions and Real-World Applications
Quiz 6.2
Ch 6.3 - Understanding Simple Mail Transfer Protocol (SMTP): Functions and Operational Uses
Quiz 6.3
Ch 6.4 - Exploring Post Office Protocol (POP): Definitions and Functional Overview
Quiz 6.4
Ch 6.5 - Insights into Internet Message Access Protocol (IMAP): Definitions and Practical Applications
Quiz 6.5
Ch 6.6 - Demystifying File Transfer Protocol (FTP): Functions, Mechanisms, and Security Implications
Quiz 6.6
Ch 6.7 - Comparative Analysis: Telnet vs. Secure Shell (SSH) for Remote Access Security
Quiz 6.7
Ch 6.8 - Delving into Service-Oriented Architecture (SOA) vs. Client-Server Architecture: Architectural Paradigms and Security Considerations
Quiz 6.8
Ch 6.9 - Web Development Essentials: HTML, XHTML, XML, CSS, and JavaScript for Secure Web Page Design and Programming
Quiz 6.9
Ch 6.10 - Navigating the Transport Layer of the OSI Model: Functions, Security Mechanisms, and Protocol Analysis
Quiz 6.10
Ch 6.11 - Understanding Denial of Service (DoS) Attacks: Definitions, Variants, and Case Studies
Quiz 6.11
Ch 6.12 - Mobile Device Security: Threats, Risks, and Challenges in the Mobile Ecosystem
Quiz 6.12
Ch 6.13 - Analyzing Mobile Malware: Detection Techniques and Countermeasures for Mobile Security
Quiz 6.13
General Questions
With UPI, you determine your own level of time commitment. You can move through coursework quickly or slow down your pace.
YES, there are exams—held online on our platform and are proctored. Your course grade distribution is:
Content Questions
To ensure your UPI Study courses transfer to your university, check two things:
1) Is your university listed? If it's one of the 1,500 universities listed with NCCRS, you're all set.
OR
2) Check your university's credit policy. If it says they accept credits from "regionally accredited" universities, you're good to go! As long as you meet one of these criteria, your courses should transfer without a hitch.
Check the list of colleges here.
Membership Questions
Yes, that is what differentiates UPI. With each student their advisor will guide them on how to move forward.