Network and System Security

Course description

As organizations and users increasingly rely upon networked applications for assessing information and making critical business decisions, securing distributed applications has become extremely significant. This course provides students with both theoretical knowledge as well as the design of techniques for securing distributed systems and networked applications. Students learn about advanced security models and techniques for secure systems design and apply them to protect information and networked applications. They are also exposed to advanced security concepts and security issues in emerging technologies and how they can be secured using the security services and mechanisms learnt in this course. On successful completion of the course students will be able to identify key security requirements and trends in a distributed networked computing environment, describe security threats and apply security functionalities to counteract security threats and evaluate authentication and access control security functionalities in distributed systems and networks.

Course outcomes


Upon the completion of this course, students will be able to:

• Understand the basics of cryptology, including historical uses, mathematical basis, types and examples of cryptography, and practical considerations for implementation
• Learn network fundamentals and security, including network topologies, protocols, address conservation, naming, network services, and network threats and countermeasures
• Perceive about several models of access control, both at a theoretical and practical level
• Understand the problems and potential solutions associated with designing and implementing operating system and application security
• Conceive common practices and be able to cite some common approaches to risk management and analysis
• Understand the concept of distributed system security
• Develop processes for system evaluation and assurance and understand what frameworks are commonly used for governance and compliance activities
• Investigate in depth on an information security topic of their choosing, as a result of completing the final paper or project requirement

Course contents


Click the down arrow icon [ 🔽 ] to expand and collapse the course topics.

🔽 0 h 42 min | Introduction to the Concepts of Security
  • Introduction to security
  • The OSI security architecture
🔽 0 h 46 min | Authentication and Security
  • Passwords
  • Address-based authentication
  • Design principles of access control
🔽 0 h 26 min | Distributed Systems Security
  • Popular distributed systems
  • Security in distributed systems
🔽 0 h 38 min | Threats in Network
  • What makes a network vulnerable?
  • Threats in transit: eavesdropping and wiretapping
  • Network security controls
  • Access controls
  • Intrusion detection system
  • Goals for intrusion detection systems
  • Security of email
🔽 0 h 47 min | Ensuring Network Confidentiality and Network Management
  • Threats from the LAN
  • Emerging technologies in WLAN
  • Network monitoring
  • Network monitoring tools
  • How AI/ML helps in network monitoring?
  • OpManager’s network monitoring and diagnostic tools
  • Simple network management protocol
  • The SNMP architecture
🔽 0 h 34 min | Protection Against Social Engineering Attacks
  • What does a social engineering attack look like?
  • Most popular social engineering tactics
  • Famous social engineers
🔽 1 h 01 min | Application Security
  • Virus and other malicious code
  • Why worry about malicious code?
  • Virus signatures
  • Targeted malicious program
  • Securing services
  • Secure email
  • Web servers
  • Web server security and database server security

 

This course includes:


    5 h 56 min recorded video

    Downloadable resources (books and articles)

    One year access

    Access on mobile and TV

    Advanced Level

    Certificate of completion

Self-paced

$55
1 year of access
This course does not have any sections.
Share this Course