Course Curriculum

    1. VIDEO: The CIA Triad

    2. VIDEO: Threats and Vulnerabilities

    3. VIDEO: Risk Management

    4. VIDEO:Defense-in-Depth Example

    5. VIDEO:Introduction to Defense-in-Depth

    6. VIDEO:Threat Terminology

    7. VIDEO:Privacy Threats

    8. VIDEO:Types of Attacks

    9. VIDEO:Zero-Day Exploits

    10. VIDEO:Caller ID Spoofing

    11. Ch 1.1 - Understanding Network Security: Definitions and Core Concepts

    12. Quiz 1.1

    13. Ch 1.2 - Classification of Network Security Measures

    14. Quiz 1.2

    15. Ch 1.3 - Assessment Techniques for Network Security

    16. Quiz 1.3

    17. Ch 1.4 - Common Threats Encountered in Network Security

    18. Quiz 1.4

    19. Ch 1.5 - Crafting Network Security Policies: Procedures and Illustrations

    20. Quiz 1.5

    21. Ch 1.6 - Strategies and Principles for Network Security Architecture

    22. Quiz 1.6

    23. Ch 1.7 - Evaluating Network Security Risks: Guidelines and Methodologies

    24. Quiz 1.7

    25. Ch 1.8 - Identifying Network Security Threats: Categories and Weaknesses

    26. Quiz 1.8

    27. Ch 1.9 - Exploring Security Zones: Purpose and Implementation

    28. Quiz 1.9

    29. Ch 1.10 - Understanding Zero-Day Vulnerabilities in Network Security

    30. Quiz 1.10

    1. VIDEO:Incident Response

    2. VIDEO:Security Control

    3. VIDEO:Security Control Functions

    4. Ch 2.1 - Understanding Information Security: Definitions and Optimal Strategies

    5. Quiz 2.1

    6. Ch 2.2 - Classifying Information Security Measures

    7. Quiz 2.2

    8. Ch 2.3 - Significance of Information Security in Modern Organizations

    9. Quiz 2.3

    10. Ch 2.4 - Implementing Information Security Management Systems

    11. Quiz 2.4

    12. Ch 2.5 - Defining Threats in the Context of Information Security

    13. Quiz 2.5

    14. Ch 2.6 - Unveiling the Concept of Security Policies: Definitions, Instances & Frameworks

    15. Quiz 2.6

    16. Ch 2.7 - Illustrative Examples of Information Security Policies and Procedures

    17. Quiz 2.7

    18. Ch 2.8 - Frameworks and Best Practices for Crafting Information Security Policies

    19. Quiz 2.8

    20. Ch 2.9 - Formulating Information Security Plans: Case Studies and Incident Response Strategies

    21. Quiz 2.9

    22. Ch 2.10 - (Lab 1) Applying Knowledge: Developing an Incident Response Plan Through Practice

    1. VIDEO: Hashing

    2. VIDEO:confidentiality and Nonrepudiation

    3. VIDEO:Cryptographic Authentication

    4. VIDEO:What is Asymmetric Encryption?

    5. VIDEO:DES

    6. VIDEO: AES Complete Explanation

    7. VIDEO:Public Key Cryptography RSA Encryption Algorithm

    8. VIDEO:Cryptographic Hash

    9. VIDEO:Public-key Infrastructure (PKI)

    10. VIDEO:More on Public-key Infrastructure (PKI)

    11. Ch 3.1 - Understanding Cryptography: Definitions and Applications

    12. Quiz 3.1

    13. Ch 3.2 - Tracing the Evolution of Encryption Techniques

    14. Quiz 3.2

    15. Ch 3.3 - Fundamentals of Basic Encryption Methods

    16. Quiz 3.3

    17. Ch 3.4 - Delving into the Advanced Encryption Standard (AES): Concepts and Overview

    18. Quiz 3.4

    19. Ch 3.5 - Exploring the Data Encryption Standard (DES)

    20. Quiz 3.5

    21. Ch 3.6 - Symmetric Encryption Demystified: Concepts and Illustrations

    22. Quiz 3.6

    23. Ch 3.7 - Unveiling the RSA Algorithm: Encryption Principles and Applications

    24. Quiz 3.7

    25. Ch 3.8 - Comparing IPsec and SSL Protocols for Secure Communications

    26. Quiz 3.8

    27. Ch 3.9 - Securing Web Communication with HTTPS Encryption

    28. Quiz 3.9

    29. Ch 3.10 - Analyzing the Differences Between WPA and WPA2 Encryption Standards

    30. Quiz 3.10

    31. Ch 3.11 - Contrasting WPA and WEP Encryption Protocols

    32. Quiz 3.11

    33. Ch 3.12 - Introduction to Public Key Encryption: Concepts and Examples

    34. Quiz 3.12

    1. VIDEO:Firewall Basics and Firewall Placement

    2. VIDEO:Inbound and Outbound Packet Processing

    3. VIDEO:Deep Packet Inspection and Routers

    4. VIDEO:Type of DoS and DDoS Attacks

    5. VIDEO:Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)

    6. VIDEO:Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

    7. Ch 4.1 - Network Security Measures: Exploring Firewalls, Encryption, Authentication, and Biometrics

    8. Quiz 4.1

    9. Ch 4.2 - Understanding Firewalls in Network Security: Roles and Applications

    10. Quiz 4.2

    11. Ch 4.3 - Comprehensive Overview of Firewalls: Features and Operational Functions

    12. Quiz 4.3

    13. Ch 4.4 - Demystifying Communication Protocols: TCP/IP and Its Functionality

    14. Quiz 4.4

    15. Ch 4.5 - Deciphering Internet Packets: Definitions and Insights

    16. Quiz 4.5

    17. Ch 4.6 - Analysis, Management, and Monitoring of Network Nodes: Tools and Techniques

    18. Quiz 4.6

    19. Ch 4.7 - Unveiling Spoofing Attacks: Definitions, Variants, and Countermeasures

    20. Quiz 4.7

    21. Ch 4.8 - Navigating the OSI Model: Utilizing Open Systems Interconnection for Data Transmission

    22. Quiz 4.8

    23. Ch 4.9 - Exploring the Application Layer of the OSI Model: Functions, Protocols, and Implementations

    24. Quiz 4.9

    25. Ch 4.10 - Integration of Communication and Wireless Computing Devices: GPS, PDAs, Cellular, and Satellite Technologies

    26. Quiz 4.10

    27. Ch 4.11 - Secure Communication with SSH Proxy Tunnels: Principles and Deployment

    28. Quiz 4.11

    29. Ch 4.12 - Components of Telecommunications Systems: Essential Elements and Configurations

    30. Quiz 4.12

    1. VIDEO:Introduction to Wireless Networks and Wireless Encryption

    2. VIDEO:Wireless Network Basics

    3. VIDEO:Packet Capturing Using tcpdump and Wireshark

    4. Ch 5.1 - Exploring Wireless Equivalent Privacy (WEP) Network Security

    5. Quiz 5.1

    6. Ch 5.2 - Implementing Robust Security Measures for Wireless Networks

    7. Quiz 5.2

    8. Ch 5.3 - Understanding Wireless Transmission Characteristics: Components and Real-World Examples

    9. Quiz 5.3

    10. Ch 5.4 - Short-Range Wireless Communication Technologies: Bluetooth, ZigBee, and Infrared Transmission

    11. Quiz 5.4

    12. Ch 5.5 - Medium-Range Wireless Communication Technologies: Wi-Fi and Hotspot Deployment

    13. Quiz 5.5

    14. Ch 5.6 - Analysis of Wide Area Network (WAN) Topologies in Wireless Networks

    15. Quiz 5.6

    16. Ch 5.7 - Comprehensive Overview of Wireless Protected Access (WPA) Security Protocol

    17. Quiz 5.7

    18. Ch 5.8 - Comparative Analysis of WPA2 AES vs. TKIP Encryption Methods

    19. Quiz 5.8

    20. Ch 5.9 - Exploring Wi-Fi Encryption Standards: Types, Security Measures, and Compliance

    21. Quiz 5.9

    22. Ch 5.10 - Comprehensive Examination of WLAN Protocols: Types and Operational Characteristics

    23. Quiz 5.10

    24. Ch 5.11 - Unveiling Radio Frequency Identification (RFID): Definitions, Applications, and Implications

    25. Quiz 5.11

    26. Ch 5.12 - Identifying and Resolving Wireless Network Security Challenges and Solutions

    27. Quiz 5.12

    28. Ch 5.13 - (Lab 2) Practical Application: Securing Wireless Networks through Hands-On Exercises

    1. VIDEOS:Types of Application Attacks

    2. VIDEO:Common Types of Malware

    3. VIDEO:Malware Functions

    4. VIDEO:The Security Risks of Viruses, Worms, and Trojan Horses

    5. VIDEO:Denial of Service (DOS)

    6. VIDEO:Distributed Denial of Service (DDoS)

    7. VIDEO:Type of DoS and DDoS Attacks

    8. VIDEO:Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS)

    9. VIDEO:Secure Sockets Layer (SSL) and Transport Layer Security (TLS

    10. VIDEO:Domain Name System (DNS) and Domain Name System Security extensions (DNSSEC)

    11. VIDEO:SSH Protocols

    12. VIDEO:SSH vs. FTP

    13. Ch 6.1 - The Internet Unveiled: Definitions, Evolution, and Functionality

    14. Quiz 6.1

    15. Ch 6.2 - Deciphering Hypertext Transfer Protocol (HTTP): Functions and Real-World Applications

    16. Quiz 6.2

    17. Ch 6.3 - Understanding Simple Mail Transfer Protocol (SMTP): Functions and Operational Uses

    18. Quiz 6.3

    19. Ch 6.4 - Exploring Post Office Protocol (POP): Definitions and Functional Overview

    20. Quiz 6.4

    21. Ch 6.5 - Insights into Internet Message Access Protocol (IMAP): Definitions and Practical Applications

    22. Quiz 6.5

    23. Ch 6.6 - Demystifying File Transfer Protocol (FTP): Functions, Mechanisms, and Security Implications

    24. Quiz 6.6

    25. Ch 6.7 - Comparative Analysis: Telnet vs. Secure Shell (SSH) for Remote Access Security

    26. Quiz 6.7

    27. Ch 6.8 - Delving into Service-Oriented Architecture (SOA) vs. Client-Server Architecture: Architectural Paradigms and Security Considerations

    28. Quiz 6.8

    29. Ch 6.9 - Web Development Essentials: HTML, XHTML, XML, CSS, and JavaScript for Secure Web Page Design and Programming

    30. Quiz 6.9

    31. Ch 6.10 - Navigating the Transport Layer of the OSI Model: Functions, Security Mechanisms, and Protocol Analysis

    32. Quiz 6.10

    33. Ch 6.11 - Understanding Denial of Service (DoS) Attacks: Definitions, Variants, and Case Studies

    34. Quiz 6.11

    35. Ch 6.12 - Mobile Device Security: Threats, Risks, and Challenges in the Mobile Ecosystem

    36. Quiz 6.12

    37. Ch 6.13 - Analyzing Mobile Malware: Detection Techniques and Countermeasures for Mobile Security

    38. Quiz 6.13

About this course

  • 255 lessons
  • 1750+ Transfer Colleges
  • ACE & NCCRS Approved
  • Globally Recognized

Answers You Didn't Know You Needed!

    General Questions

  • With UPI, you determine your own level of time commitment. You can move through coursework quickly or slow down your pace.

  • YES, there are exams—held online on our platform and are proctored. Your course grade distribution is:

    • 25% Attendance
    • 25% Quiz
    • 25% Assignments
    • 25% Final Exam
  • Content Questions

  • To ensure your UPI Study courses transfer to your university, check two things: 

    1) Is your university listed? If it's one of the 1,500 universities listed with NCCRS, you're all set. 

    OR 

    2) Check your university's credit policy. If it says they accept credits from "regionally accredited" universities, you're good to go! As long as you meet one of these criteria, your courses should transfer without a hitch.

    Check the list of colleges here.

  • Membership Questions

  • Yes, that is what differentiates UPI. With each student their advisor will guide them on how to move forward.