This course develops a managerial level review of technical knowledge and terminology for data, voice, image and video communications and computer networks to effectively communicate with technical, operational and management people in telecommunications. The course will cover Telecommunications and Network Security domain which encompasses topics to include: access control network structure, transmission methods, transport formats and security measures used to maintain the integrity, availability, authentication and confidentiality of the transmitted information over both private and public communication networks. The course will also give an overview of network security and the basics of cryptography. Additional topics include but are not limited to: threat models, authentication and authorization mechanisms and standards, public key infrastructure, electronic mail security, network layer security, transport layer and web security, packet filtering, firewalls, intrusion detection and virtual private networks.
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
The modern business environment is utilizing web-based servers and systems for a variety of processes. This includes telecommunications and network systems as well. Because of this adoption of web-based resources, firms need to develop new approaches for protecting business data networks. BMIS 662 examines security applications, procedures, and best practices for business telecommunications and networks.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Discuss the relevance of course material and the use of technology to a biblical worldview.
- Compare security issues related to the major computer network topographies, protocols, and ports.
- Demonstrate the ability to assess the secure nature of data transmitted over various types of computer network and communication domains.
- Explore security on emerging wired and wireless computer networking technologies.
- Understand how to inspect the contents of a packet and its capacity to be filtered at various levels of the OSI Model.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions are collaborative learning experiences. Therefore, the student will participate in 8 Discussions by completing the assigned readings. The student will post 1 thread of at least 300 words and 2 replies. Each reply must be at least 100 words.
Application Activities (3)
The student will compile 7-page reports for 3 Application Activities in this course. Each activity will focus on a different aspect of network security in preparation for the Final Project. Each report must include a title page, diagrams, and references.
This assignment will be completed in 2 parts:
Final Project Outline
The student will complete a 5-page topic proposal including his/her statement of the technology that has been selected, as well as an outline of the project and the anticipated outcomes.
The student will identify and investigate current problems/risks in the network security industry specific to a chosen topic. The student will compile a minimum of 20 pages including proposed technology, literature review, overview, background, related work, results, documentation, diagrams, and charts. The student must cite at least 15 scholarly sources, not including the textbook.
Two quizzes will cover the Learn material for the assigned Modules: Week. Each quiz will be open-book/open-notes, contain 20 multiple-choice and true/false questions, and have a 30-minute time limit. A Quiz: Midterm Exam will cover the learn material from Module 1: Week 1 to Module 4: Week 4. The quiz will be open-book/open-notes, contain 50 multiple-choice and true/false questions, and have a 1-hour time limit.