You are here

Applied Network Security

TLEN 5530
CREDITS: 3

Applied Network Security

Fall 2014


Distance / Main Campus

Joe McManus

MON 6:00 PM - 8:30 PM
Classroom: ECEE 283

Description: 

This course provides a foundational understanding of key information security concepts applied to the field of network security. Through this class you will get a hands-on knowledge of information security, network security and physical security. Lectures will introduce topics and include real-world examples of hardening and exploiting systems.

When you leave this class you will be a qualified network security professional armed with the knowledge you have gained.

The security topics covered are: information security governance, risk management, access control, security architecture, physical security, network security, cryptography, business continuity, disaster recovery, legal regulations, applications, and operations. Students can expect to gain a working knowledge of the critical areas of information security that most IT organizations face today.

Outline: 

The course is divided into the following major domains in line with the CISSP exam:

  • Information Security and Risk Management
  • Access Control
  • Security Architecture and Design
  • Physical and Environmental Security
  • Telecommunications and Network Security
  • Cryptography
  • Business Continuity and Disaster Recovery
  • Legal, Regulations, Compliance, and Investigations
  • Application Security
  • Operations Security

Benefits: 

Students can expect to gain a working knowledge of the critical areas of information security that most IT organizations face today, as well as, prepare for (ISC)2's CISSP exam https://www.isc2.org/cissp/default.aspx.

Objectives: 

This course will apply Information Security concepts to Networks and Networked Systems. This will be accomplished through a combination of lecture and hands on examples.

Prerequisites: 

TLEN 5330 (Data Communications 1) or an equivalent course/background.

Textbooks: 

Required: Official (ISC)2 Guide to the CISSP CBK, 2nd Edition, CRC Press, 2010, ISBN 978-1-4398-0959-4.

Hardware/Software: 

Access to the Internet. Students will access course materials using WebCT. Go to webct.colorado.edu for logon information and browser settings.

Example Lecture: 

View an example course lecture

Proctor: 

Not Required

Syllabus: 

Any syllabus provided above may not be the most recent version. Please refer to the course syllabus provided by the instructor of this course.

Previous Course Offerings

See up to the past five offerings of this course:
Semester Type Instructor(s) Schedule
Fall 2013 Distance / Main Campus Joe McManus MON
6:15 PM - 8:45 PM