Skip to content

dthomsen116/SEC-350

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Certification of Authenticity:

I certify that this is entirely my own work, except where I have given fully-documented references to the work of others. I understand the definition and consequences of plagiarism and acknowledge that the assessor of this assignment may, for the purpose of assessing this assignment:

  • Reproduce this assignment and provide a copy to another member of academic
  • staff; and/or Communicate a copy of this assignment to a plagiarism checking
  • service (which may then retain a copy of this assignment on its database for
  • the purpose of future plagiarism checking)

Course Information

Course Name: Enterprise and Network Security Controls

Course Number: SEC-350

Professor: Devin Paden

Semester: Fall 2022

Student Name: David Thomsen

REPO Description

This course repository provides the work completed and assignments given during Enterprise and Network Security Controls, taught by Professor Paden. It includes essential information about the course, such as its description, objectives, and required materials. Please read through this document to familiarize yourself with the course content and expectations.

Course Description

Students will examine network-based threats whether originating from the Internet or the local LAN, and learn about ways to protect, detect, and defend the enterprise network from such attacks. The relationship between user network policy and securing the network will also be explored. Students will participate in hands-on experiments and demonstrate their understanding of subject matter via projects and presentations:

  • Introduction to Information Security, Security Policies and Standards
  • Log Management and Analysis
  • Intrusion Detection Systems
  • Authenticating Users
  • Introduction to Network Firewalls and Packet Filtering
  • Firewall Configuration and Administration
  • Working with Proxy Servers and Application ­Level Firewalls
  • Encryption – The Foundation for the Virtual Private Network

CLOs

Upon completion of this course, the student will be able to:

  • segment, defend and establish visibility over an enterprise network.
  • configure network security devices such as network firewalls in order to segment a network and enforce network security policies.
  • research, design and deploy a logging infrastructure in order to gain visibility into enterprise security events.
  • correlate and analyze network security events in the context of a security information and event management tool
  • deploy network proxy servers in order to gain visibility on network traffic
  • research, integrate and deploy network intrusion detection tools to complement a logging infrastructure
  • research, duplicate and mitigate common network security vulnerabilities.
  • design and deploy secure remote access solutions to include site-to-site and remote access use cases.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published