CS 252: Network and Systems Security
The course aims to cover the fundamentals of information security, focusing on critical areas such as network encryption, firewall systems, authentication processes, and auditing and configuration practices.
The course aims to cover the fundamentals of information security, focusing on critical areas such as network encryption, firewall systems, authentication processes, and auditing and configuration practices.
Introduction
What Is Network Security?
Fundamentals of Network Security
Scope of Network Security
Lesson Summary
Quiz 1.1
Network Security
How Network Security is Implemented
Hardware Appliance
Software
As a Service (Cloud-based)
Types of Network Security
Lesson Summary
Quiz 1.2
Preparing for the Worst
What Is Network Security?
Network Security Testing
Tools Used for Network Security Testing
Lesson Summary
Quiz 1.3
Different Threats
Active vs. Passive
Examples of Active Threats
Examples of Passive Threats
Lesson Summary
Quiz 1.4
What is a Network Security Policy?
How is a Network Security Policy Developed and Maintained?
Lesson Summary
Quiz 1.5
Securing the Point of Entry
What is Network Security?
What is Network Security Design?
What are Some Best Practices or Principles for Network Security Design?
Lesson Summary
Quiz 1.6
The Root Cause
What is Network Security?
What is a Network Security Risk Assessment?
What Does a Checklist for a Network Security Risk Assessment Look Like?
What is the Methodology for a Network Security Risk Assessment?
Lesson Summary
Quiz 1.7
What is a Computer Network?
Social Impact of Computer Networks
Defining Network Security
Common Network Vulnerabilities
Computer Viruses
Limiting Your Network Vulnerabilities
Lesson Summary
Quiz 1.8
In the Security Zone
Security Layers
Types of Security Zones
Uncontrolled Zone
Controlled Zone
Restricted Zone
Establishing Security Zones
Lesson Summary
Quiz 1.9
What does Zero Day Vulnerability Mean?
Why is it such a point of concern?
How do teams respond?
How Can Teams Limit It From Becoming an Issue?
Lesson Summary
Quiz 1.10
Introduction
Information Security
Confidentiality
Integrity
Availability
Maintaining Information Security
Lesson Summary
Quiz 2.1
Types of Information Security
Definition of Information Security Types
Lesson Summary
Quiz 2.2
Information Security Background
The CIA Triad
1. Confidentiality
2. Integrity
3. Availability
Lesson Summary
Quiz 2.3
Information, the Key to Everything
What is Information Security?
What is Information Security Management System?
Why are Information Security Management Systems Important?
Lesson Summary
Quiz 2.4
The Need for Information Security
What is Information Security?
What is a Threat?
How Do Threats Relate to Information Security?
Lesson Summary
Quiz 2.5
What Is a Security Policy?
Protecting the Employees
Protecting the Assets
Protecting the Data
Creating an Effective Policy
Lesson Summary
Quiz 2.6
What is Information Security Policy
Procedures Examples
Lesson Summary
Quiz 2.7
Defining Information Security
Information Security Framework (ISF)
Information Security Framework Best Practices
Lesson Summary
Quiz 2.8
The Threat to Information
What is Information Security?
What is an Information Security Plan?
An Example Information Security Plan
How Does Incident Response Fit into the Picture?
Lesson Summary
Quiz 2.9
Lesson Overview & Knowledge Required
Incident Response Plan Template
Incident Response Plan Updates
Section 4.3 Breach Indicator
Section 5.5 Reporting
Section 6.1 General
Optional Activity: Re-order Section 6.1
Follow-Up Questions
Who Should Have Access?
Alternative Methods of Delivery
Answer Key
Follow-Up Questions
Introduction
What is Cryptography?
Objectives of Cryptography?
Uses of Cryptography
Secrecy in Data Transmission
Secrecy in Data Storage
Integrity in Data Transmission
Integrity in Data Storage
User Authentication
Lesson Summary
Quiz 3.1
What Is Encryption?
Encryption Throughout History
Encryption Today
Lesson Summary
Quiz 3.2
What is Encryption and Why Do We Need It?
Basic Methods of Encryption
General Characteristics
Lesson Summary
Quiz 3.3
What Is AES?
Typical Uses
Basic Characteristics
Encryption Strength
Worldwide Adoption
Lesson Summary
Quiz 3.4
The Need for Encryption
History of the Data Encryption Standard (DES)
The Basics of Encryption
Symmetric Encryption
Asymmetric Encryption
Lesson Summary
Quiz 3.5
What Is Symmetric Encryption?
Data Encryption Standard (DES)
Lesson Summary
Quiz 3.6
Protecting Life on the Internet
What is Encryption?
What is the RSA Algorithm?
How Does It Work?
What is It Used for?
Lesson Summary
Quiz 3.7
Making a Secure Connection
IPSec: Internet Protocol Security
SSL: Secure Sockets Layer
Comparing IPSec to SSL
VPN
IPSec vs. SSL
Lesson Summary
Quiz 3.8
Secure Communications
What is HTTPS?
What is Encryption?
What is HTTPS Encryption?
Why Would We Want to Use It?
Lesson Summary
Quiz 3.9
What is Encryption?
WPA or Wi-Fi Protected Access
WPA2
Lesson Summary
Quiz 3.10
What Is Encryption?
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Lesson Summary
Quiz 3.11
The Protective Barrier
What Is Encryption?
What Is Public Key Encryption?
Public Key Encryption: Uses
How Does It Work?
Lesson Summary
Quiz 3.12
Introduction
Security Threats
System Security
Firewall
Encryption
Passwords
Biometrics
Lesson Summary
Quiz 4.1
What's a Firewall and How Does It Protect You?
How Traditional Firewalls Work
The Evolution of the Firewall
Lesson Summary
Quiz 4.2
Building Barriers
Firewall Functions
Firewall Features
Lesson Summary
Quiz 4.3
Introduction to TCP/IP
Terminology
Description
IP Addressing
Lesson Summary
Quiz 4.4
Basic Principles
Key Terms
Data Packet Description
Data Packet Composition
Packet Loss
Lesson Summary
Quiz 4.5
Breaking Down the Traffic
Networking Basics
Network Management & Monitoring
Network Traffic Analysis
Lesson Summary
Quiz 4.6
What Is Spoofing?
Types of Spoofing
Caller ID Spoofing
E-mail Spoofing
Website Spoofing
IP Spoofing
ARP Spoofing
Extension Spoofing
Text Message Spoofing
GPS Spoofing
Facial Spoofing
Example of Spoofing
How to Defend Against Spoofing
Lesson Summary
Quiz 4.7
Open Systems Interconnection (OSI) Model
The Seven Layers of the OSI Model
How the OSI Model Works: An Example
Lesson Summary
Quiz 4.8
Application Layer Defined
The Seven Layers
Protocols and Functions
Lesson Summary
Quiz 4.9
Wireless Communication
Mobile Phones
Tablet Computers
PDAs
Satellite Phones
GPS
Lesson Summary
Quiz 4.10
What Is SSH Proxy Tunneling?
SSH Tunneling Illustrated
SSH Applications
Encrypted File Transfers
Secure Command Shell
Port Forwarding
Lesson Summary
Quiz 4.11
Telecommunication Systems
Components of a Telecommunication System
Computer Network
Different Types of Networks
Network Properties
Lesson Summary
Quiz 4.12
Introduction
The Tale of Cables
What is WEP?
What is Network Security?
How Does WEP Relate to Network Security?
Lesson Summary
Quiz 5.1
Why Secure a Wireless Network?
Encryption
Network Names and Passwords
Advanced Steps
Lesson Summary
Quiz 5.2
Wireless Transmission
Frequency Ranges
Wireless Transmission Components
1. Antennas
2. Signal Strength
3. Signal Degradation
4. Signal Types
5. Fixed vs. Mobile Network
Lesson Summary
Quiz 5.3
Short-Range Wireless
Bluetooth
Infrared
Zigbee
Other Examples
Lesson Summary
Quiz 5.4
Wi-Fi
Access Points & Hotspots
Lesson Summary
Quiz 5.5
What Is a Wide Area Network?
Types of Network Topologies
Lesson Summary
Quiz 5.6
What is WPA?
Why WPA?
WPA Security
WPA2 vs WPA2 Enterprise
Lesson Summary
Quiz 5.7
Temporary Key Integrity Protocol
Advanced Encryption Standard
Lesson Summary
Quiz 5.8
Wi-Fi Encryption
Why You Should Care
Putting It All Together
Types of Wi-Fi Encryption
Lesson Summary
Quiz 5.9
What are WLAN Protocols?
Types of WLAN Protocols
802.11a Protocol
802.11b Protocol
802.11g Protocol
802.11n Protocol
802.11ac Protocol
Lesson Summary
Quiz 5.10
RFID meaning, tags .applications.
Kinds of RFID Tags
Lesson Summary
Quiz 5.11
Why Is Wireless Network Security A Concern?
What About When I Use Public Wi-Fi?
How Do Businesses Protect Their Wireless Networks?
Lesson Summary
Quiz 5.12
Lesson Overview & Knowledge Required
Securing a Wireless Network
Follow-Up Questions
Restrict Access to Specific Devices
WEP Security
Admin Password
Answer Key
Network Setup Worksheet
Introduction
What Is the Internet?
Who Created the Internet?
How Does Information Move Across the Internet?
What Makes Up the Internet?
Lesson Summary
Quiz 6.1
What Is Hypertext Transfer Protocol?
What is Hypertext Transfer Protocol: Components and Terms
What is HTTP Protocol: The Process of HTTP
Lesson Summary
Quiz 6.2
What is SMTP?
How does SMTP Work?
SMTP Protocol
Mail Transfer
SMTP Server Meaning
Lesson Summary
Quiz 6.3
Definition
History and Evolution
Everyday Usage
Lesson Summary
Quiz 6.4
What is Internet Message Access Protocol (IMAP)?
IMAP Port Access
IMAP Uses
Lesson Summary
Quiz 6.5
What is File Transfer Protocol?
History, Types, Categories of FTP
What is FTP Used For?
FTP Port Number
How FTP Works
Differences between FTP, HTTP, and MFT
FTP Client
FTP, TCP or UDP
FTP Security
Lesson Summary
Quiz 6.6
Telnet Vs. SSH
Telnet
SSH
Lesson Summary
Quiz 6.7
Computing Architecture
What is Service-Oriented Architecture (SOA)?
What is Client-Server Architecture (CSA)?
Client-Server vs Server-Oriented Architecture
Lesson Summary
Quiz 6.8
Website Design Defined
Planning Your Website
Building Your Website's Foundation
Decorating Your Website
Cascading Style Sheets (CSS)
JavaScript
HTML5
Layouts
Finalizing Your Website
Lesson Summary
Quiz 6.9
Layers of the OSI Model
Transport Layer
Services
Functions
Protocols
Lesson Summary
Quiz 6.10
What is a DoS attack?
Denial of Service Attack Types
Distributed DOS Attacks
Application Layer Attacks
Advanced Persistent DoS attacks
Denial-of-Service as a Service attacks
Denial of Service Attack Examples
Denial of Service Attack Targets
Denial of Service Attack Problems
Defense Techniques
Lesson Summary
Quiz 6.11
Security of a Mobile Device
Passwords
Theft
Malware
Encryption and Networks
Lesson Summary
Quiz 6.12
Avoiding Mobile Malware
Decreased Measurables
Slow Performance
Bill Hikes
Lesson Summary
Quiz 6.13
Introduction
When to Use an Access Control Matrix
What Is an Access Control Matrix?
Access Control Matrix Explained
Access Control Models
Lesson Summary
Quiz 7.1
Biometric Security Overview
Retina and Iris Recognition
Fingerprint Recognition
Voice Pattern Recognition
Lesson Summary
Quiz 7.2
What is Network Access Protection (NAP)?
Why Network Access Protection (NAP)?
Overview of the Network Access Protection Process
Network Access Protection Components
Network Policy Validation
Monitoring-Only Environment
Health Requirement Policy Compliance
Isolation Environment
Limited Access for Non-Compliant Users
Lesson Summary
Quiz 7.3
A Smarter Way to Shop
What Is a Smart Card?
Smart Card vs. Other Payments
Lesson Summary
Quiz 7.4
What is Network Traffic?
Monitoring Network Traffic
Network Bandwidth
Network Filtering
Lesson Summary
Quiz 7.5
Lesson Overview & Knowledge Required
Nagios Core
Tactical Overview
Network Outages
Reports to Alerts
Back to Services
Locate host on a map
Service Groups
Lesson Summary
What is NIC?
What Does a Network Card Do?
Types of NIC
Wireless NIC
Wired NIC
USB
Fiber Optics
Lesson Summary
Quiz 7.7
What is a Domain Controller?
Active Directory
Functions of a Domain Controller
Multiple Domains
Difference between a Domain and a Domain Controller
Lesson Summary
Quiz 7.8
The Need to Be Safe
What is Encryption?
What is Kerberos?
What are the Types of Kerberos Encryption?
Lesson Summary
Quiz 7.9
VPN Defined
Different Types of VPNs
How Do VPNs Work?
Lesson Summary
Quiz 7.10
What is VPN Encryption?
Types of VPNs and Functionality
Protocols Used in VPN Encryption
Lesson Summary
Quiz 7.11
Security Perimeters in Real Life
Understanding Security Perimeters
Understanding Access
Preventing Access
Addressing Access
Lesson Summary
Quiz 7.12
What Are Intranets and Extranets?
The Business Value
Virtual Private Networks
Lesson Summary
Quiz 7.13
Introduction to Risks
Risk and the Risk Matrix
Risk Measurements
A Risk Contingency Plan
Lesson Summary
Quiz 7.14
What is an IT Disaster?
Internal Recovery Strategies
Vendor Supported Recovery Strategies
Data Backup
Components of an DRP
Lesson Summary
Quiz 7.15
Introduction
Configuration Management (CM)?
Configuration Management Process
Configuration Management Tools
Lesson Summary
Quiz 8.1
Configuration Management
Change Control
Version Control
Configuration Control
Impact of Change Control, Version Control and Configuration Control
Lesson Summary
Quiz 8.2
What is Cisco ASA?
Cisco ASA Hardware
The PoE Feature (Power over Ethernet)
The Failover Feature
Cisco ASA Security Features
Cisco Cloud Security
Secure Remote Access
Firewalls
Intrusion Prevention System (IPS)
Zero-Day Attacks
Lesson Summary
Quiz 8.3
Cisco Adaptive Security Appliance
Cisco ASA 5505 Installation
How Cisco ASA 5505 Works
Initial Configurations
Implementing Firewall Services
Lesson Summary
Quiz 8.4
Lesson Overview & Knowledge Required
Setting Up the Device
Assumptions
Setup and Configuration
1.Launch ASDM
2. Security Settings
Summary
Protecting What's Important
What Is Data Security?
What Is an Intrusion Detection System (IDS)?
What Types of Intrusion Detection Systems Are There?
What Are Some Methods of Intrusion Detection?
Lesson Summary
Quiz 8.6
Getting Screened
What Is An IPS?
Intrusion Prevention versus Intrusion Detection
IPS Types
How an IPS Works
Balancing Safety with Performance
Intrusion Prevention Activities
Lesson Summary
Quiz 8.7
Lesson Description and Knowledge Required
Suricata IDS/IPS
1. Install Suricata
2. Install Npcap
Install a Text Editor
Update the .yaml file
Update the Rules
3. Configure Suricata
4. Run the Program
Summary
Change Management Definition
Why Strategic Change Matters
Change Management Strategy Models
SWOT Analysis
Kotter's Change Model
Kurt Lewin's Change Model
Lesson Summary
Quiz 8.9
What is the Planned Change Process?
Planned Change Process
Recognize Need for Change
Develop Change Goals
Appoint a Change Agent
Assess the Current Climate
Develop a Plan
Implement the Plan
Evaluate Change
Planned Change Example
Lesson Summary
Quiz 8.10
Networks and Protection
What is Network Security?
Network Security Auditing
Tools Used for a Network Security Audit
Checklist for an Audit
Lesson Summary
Quiz 8.11
What is ISACA?
ISACA Audit Phases
Lesson Summary
Quiz 8.12
IT Project Risk Management Overview
Risk Management Framework
Inputs
Risks vs. Issues
Tools & Techniques
Lesson Summary
Quiz 8.13
Definition of Continual Improvement
Plan-Do-Check-Act Cycle
Example of Continual Improvement
Continual Improvement as a Management Philosophy
Lesson Summary
Quiz 8.14
Information Technology Control Frameworks
COBIT
COBIT Principles
eSAC
Lesson Summary
Quiz 8.15
Network Address Translation (NAT)
Basic NAT
One-to-Many NAT
How Does This Translation Work?
Types of Address Translations
Static NAT
Dynamic NAT
Port Address Translation
Applications and Examples of NAT Software
Features of NAT
IP Conservation
Security
Lesson Summary
Quiz 8.16
Assignment
Final Exam
Ch 1.1 - What is Network Security? - Definition & Fundamentals
Ch 1.2 - Types of Network Security
Ch 1.3 - How to Test Network Security
Ch 1.4 - Types of Attacks in Network Security
Ch 1.5 - What is a Network Security Policy? - Procedures & Examples
Ch 1.6 - Network Security Design: Best Practices & Principles
Ch 1.7 - Network Security Risk Assessment: Checklist & Methodology
Ch 1.8 - Network Security Threats: Types & Vulnerabilities
Ch 1.9 - Security Zones: Definition & Purpose
Ch 1.10 - What is Zero Day Vulnerability?
Ch 2.1 - What is Information Security? - Definition & Best Practices
Ch 2.2 - Types of Information Security
Ch 2.3 - Importance of Information Security
Ch 2.4 - Information Security Management Systems
Ch 2.5 - Definition of Threat in Information Security
Ch 2.6 - What Is a Security Policy? - Definition, Examples & Framework
Ch 2.7 - Information Security Policy & Procedure Examples
Ch 2.8 - Information Security Policy: Framework & Best Practices
Ch 2.9 - Information Security Plan: Examples & Incident Response
Ch 2.10 - Practice Creating an Incident Response Plan
Ch 3.1 - What is Cryptography? - Definition & Uses
Ch 3.2 - The History of Encryption
Ch 3.3 - Basic Encryption Methods
Ch 3.4 - What is Advanced Encryption Standard (AES)? - Definition & Overview
Ch 3.5 - What is The Data Encryption Standard (DES)?
Ch 3.6 - Symmetric Encryption: Definition & Example
Ch 3.7 - RSA Algorithm: Encryption & Example
Ch 3.8 - IPsec vs. SSL
Ch 3.9 - HTTPS Encryption
Ch 3.10 - WPA vs. WPA2 Encryption
Ch 3.11 - WPA vs. WEP Encryption
Ch 3.12 - Public Key Encryption: Definition & Example
Ch 4.1 - Systems Security: Firewalls, Encryption, Passwords & Biometrics
Ch 4.2 - What is a Firewall in Network Security? - Role & Use
Ch 4.3 - Firewalls in Network Security: Features & Functions
Ch 4.4 - What is Communication Protocol? - TCP/IP & Explanation
Ch 4.5 - Internet Packet: Definition & Explanation
Ch 4.6 - Network Node: Analysis, Management & Monitoring Tools
Ch 4.7 - What is a Spoofing Attack? - Definition & Types
Ch 4.8 - OSI Model: Using Open Systems Interconnection to Send and Receive Data
Ch 4.9 -Application Layer of the OSI Model: Definition, Functions & Protocols
Ch 4.10 - Communication & Wireless Computing Devices: GPS, PDA, Cellular & Satellite
Ch 4.11 - SSH Proxy Tunnels
Ch 4.12 - The Components of a Telecommunications System
Ch 5.1 - What is WEP Network Security?
Ch 5.2 - How to Secure a Wireless Network: Best Practices & Measures
Ch 5.3 - Wireless Transmission Characteristics: Components & Examples
Ch 5.4 - Short-Range Wireless Communication: Bluetooth, ZigBee & Infrared Transmission
Ch 5.5 - Medium-Range Wireless Communication: Wi-Fi & Hotspots
Ch 5.6 - Wide Area Network Topologies
Ch 5.7 - What is Wireless Protected Access (WPA)?
Ch 5.8 - WPA2 AES vs. TKIP
Ch 5.9 - Wi-Fi Encryption: Types, Security & Standards
Ch 5.10 - WLAN Protocols: Types & Characteristics
Ch 5.11 - What is RFID? - Definition & Applications
Ch 5.12 - Wireless Network Security Issues & Solutions
Ch 5.13 - Practice Securing a Wireless Network
Ch 6.1 - What is the Internet? - Definition & Explanation
Ch 6.2 - Hypertext Transfer Protocol: Definition & Examples
Ch 6.3 - Simple Mail Transfer Protocol: Definition & Uses
Ch 6.4 - Post Office Protocol (POP): Definition & Overview
Ch 6.5 - Internet Message Access Protocol: Definition & Uses
Ch 6.6 - What is File Transfer Protocol (FTP)? - Definition & Explanation
Ch 6.7 - Telnet vs. SSH
Ch 6.8 - Service-Oriented Architecture vs. Client-Server Architecture
Ch 6.9 - Web Page Design and Programming Languages: HTML, XHTML, XML, CSS & JavaScript
Ch 6.10 - Transport Layer of the OSI Model: Functions, Security & Protocol
Ch 6.11 - What is a Denial of Service (DoS) Attack? - Definition, Types & Examples
Ch 6.12 - Mobile Device Security Threats, Risks & Issues
Ch 6.13 - Mobile Malware: Analysis & Detection
Ch 7.1 - Access Control Matrix: Model & Example
Ch 7.2 - What is Biometric Security? - Definition, Systems & Devices
Ch 7.3 - What is Network Access Protection (NAP)?
Ch 7.4 - Smart Cards: Definition, Uses & Examples
Ch 7.5 - Capturing Network Traffic: Definition & Processes
Ch 7.6 - Practice Monitoring and Auditing Network Traffic
Ch 7.7 - Network Interface Card (NIC): Types, Function & Definition
Ch 7.8 - What is a Domain Controller? - Definition & Function
Ch 7.9 - Kerberos Encryption Types
Ch 7.10 - What Is a Virtual Private Network (VPN)? - Definition & Types
Ch 7.11 - VPN Encryption: Types & Protocols
Ch 7.12 - Security Perimeter: Definition, Solutions & Devices
Ch 7.13 - Intranet and Extranet: Comparing Information and Data Dissemination
Ch 7.14 - Types of Risk & Creating Contingency Plans
Ch 7.15 - IT Disaster Planning & Recovery
Ch 8.1 - What Is Configuration Management? - Definition, Process & Tools
Ch 8.2 - Configuration Management: Control Items & Procedures
Ch 8.3 - Cisco ASA Security: Features & Hardware
Ch 8.4 - Cisco ASA 5505 Configuration: Definition & Purpose
Ch 8.5 - Practice Setting Up and Configuring the Cisco ASA 5505 (Lab 1)
Ch 8.6 - Intrusion Detection Systems (IDS) in Data Security
Ch 8.7 - Intrusion Prevention System (IPS): Definition & Types
Ch 8.8 - Practice Detecting and Preventing Network Breaches
Ch 8.9 - What Is Strategic Change Management? - Definition, Models & Examples
Ch 8.10 - The Planned Change Process
Ch 8.11 - Network Security Audit: Tools & Checklist
Ch 8.12 - ISACA: IT Audit Standards, Tools & Phases
Ch 8.13 - IT Project Risk Management: Framework & Process
Ch 8.14 - What Is Continual Improvement? - Definition & Process
Ch 8.15 - Information Technology Control Frameworks Overview
Ch 8.16 - Address Translation: Definition, Types & Examples
General Questions
With UPI, you determine your own level of time commitment. You can move through coursework quickly or slow down your pace.
YES, there are exams—held online on our platform and are proctored. Your course grade distribution is:
Content Questions
To ensure your UPI Study courses transfer to your university, check two things:
1) Is your university listed? If it's one of the 1,500 universities listed with NCCRS, you're all set.
OR
2) Check your university's credit policy. If it says they accept credits from "regionally accredited" universities, you're good to go! As long as you meet one of these criteria, your courses should transfer without a hitch.
Check the list of colleges here.
Membership Questions
Yes, that is what differentiates UPI. With each student their advisor will guide them on how to move forward.