How to identify when attacks are happening inside networks
How to collect evidence of network intrusions
How to test networks and systems for vulnerabilities
How to prepare for and defend against network attacks
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.
The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.
You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.
You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.
This course is a part of the RITx Cybersecurity MicroMasters Program.
Unit 1: Packet Sniffing
Unit 2: Password Cracking
Unit 3: Port Scanning
Unit 4: Exploits and Exploiting
Unit 5: Access Control Lists
Unit 6: Snort
Unit 7: DHCP, DNS, and Switch Attacks and Mitigations
Unit 8: Man in The Middle Attacks and Mitigations
Successful completion of CYBER501x Cybersecurity Fundamentals