A study of the control of unwanted intrusions into, use of, or damage to a business’ computer network. This course will cover elements that prevent unwanted activities in an efficient and cost effective manner. This study will start with a focus on the business challenges and threats network professionals face in their day to day operations. It explores the nature and intent of hackers and defines preventative measures such as Intrusion Detection Systems, firewalls, and virtual private networks. (Formerly BMIS 335)
In today’s increasingly complex business data communications networks, it is critical to be able to secure our knowledge capital to create and maintain business competitive advantage. The most exposed link is our business networks. As an MIS professional, we must be able to advise/implement network security.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Discuss the relevance of course material to a biblical world view.
- Describe the 7 domains of a typical IT infrastructure where network security is implemented.
- Specify goals of network security as they would exist inside a typical organization.
- Compare and contrast network security concerns in wired, wireless and fiber-based networks.
- Describe the principles and fundamentals of firewalls.
- Describe the principles and fundamentals of Virtual Private Networks (VPN).
- Demonstrate an understanding of the concepts of network threats including but not limited to: internal versus external threats, hacker motivation, environmental threats, fragmentation attacks, and malicious code.
- Design a network which includes: defense-in-depth, hardening systems, encryption, and node security.
Textbook readings and lecture presentations/notes
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions are collaborative learning experiences. Therefore, for the first Discussion, the student must reply to all other students’ threads. For the remaining Discussions, the student will post a thread in response to the topic and then reply to at least 1 classmate’s thread.
Threads are required to be at least 250 words, professional in content and delivery, and written in proper English. Replies must be at least 150 words, and must likewise be professional and written in proper English.
Essay Assignments (4)
The essays are network security topical and relate to the readings in the assigned Module: Week. They are designed to expand the student’s study into specific network security areas. Essays must be 1000 - 1500 words, but need to be complete thoughts and use proper grammar. The student will post his/her essays to the proper Essay Assignment submission link.
Each quiz will cover the content from the weekly reading, presentation, discussion and topics covered. The quizzes will consist of 15 multiple-choice questions. The student will have 1 hour to complete each.
Quiz: Exams (2)
The exams consist of 50 multiple-choice questions covering the Learn material for the preceding modules. Each exam is an open-book/open-notes, open-resources exam.
CybrScore Lab Assignments (8)
The student will complete the assigned labs through the third-party platform.