You are here

Applied Network Security

TLEN 5530
CREDITS: 3

Applied Network Security

Fall 2014


Distance / Main Campus

Joe McManus

MON 6:00 PM - 8:30 PM
Classroom: ECEE 283

Description: 

This course provides a foundational understanding of key information security concepts applied to the field of network security. Through this class you will get a hands-on knowledge of information security, network security and physical security. Lectures will introduce topics and include real-world examples of hardening and exploiting systems.

When you leave this class you will be a qualified network security professional armed with the knowledge you have gained.

The security topics covered are: information security governance, risk management, access control, security architecture, physical security, network security, cryptography, business continuity, disaster recovery, legal regulations, applications, and operations. Students can expect to gain a working knowledge of the critical areas of information security that most IT organizations face today.

Outline: 

The course is divided into the following major domains in line with the CISSP exam:

  • Information Security and Risk Management
  • Access Control
  • Security Architecture and Design
  • Physical and Environmental Security
  • Telecommunications and Network Security
  • Cryptography
  • Business Continuity and Disaster Recovery
  • Legal, Regulations, Compliance, and Investigations
  • Application Security
  • Operations Security

Benefits: 

Students can expect to gain a working knowledge of the critical areas of information security that most IT organizations face today, as well as, prepare for (ISC)2's CISSP exam https://www.isc2.org/cissp/default.aspx.

Objectives: 

This course will apply Information Security concepts to Networks and Networked Systems. This will be accomplished through a combination of lecture and hands on examples.

Prerequisites: 

TLEN 5330 (Data Communications 1) or an equivalent course/background.

Textbooks: 

Required: Official (ISC)2 Guide to the CISSP CBK, 2nd Edition, CRC Press, 2010, ISBN 978-1-4398-0959-4.

Hardware/Software: 

Access to the Internet. Students will access course materials using WebCT. Go to webct.colorado.edu for logon information and browser settings.

Example Lecture: 

View an example course lecture

Proctor: 

Not Required

Syllabus: 

Any syllabus provided above may not be the most recent version. Please refer to the course syllabus provided by the instructor of this course.