Network security covers a broad area, including the security of devices that comprise the network infrastructure, the security of the traffic sent over that infrastructure, the hosts (clients and servers) attached to the infrastructure, applications that utilize the network, the user community, the policies that govern usage of that network, and so forth. This course covers principles and practices of network security by using the first four layers of the OSI protocol stack (physical, link, network, and transport) to examine how devices and protocol at each layer provide "defense in depth" both by securing communications traffic and by preventing unauthorized access to the various networks segments interconnected by these devices. The course explores elements of a network security architecture, and design patters are used to understand how these elements can be combined into an integrated design that effectively supports the security policies of the enterprise.
At the end of the course, students will be able to:
Describe various security services that can be utilized at layers 1-4 of the OSI protocol stack.
Assess benefits and disadvantages of implementing security services at each layer.
Describe the differences between secret key and public key encryption, list the elements of a Public Key Infrastructure, and describe the challenges of implementing a key management system.
Describe the applicability of design patterns in the course of designing a network infrastructure.
Explain how VLANs and Private VLANs can enhance security by segregating traffic at the link layer.
Distinguish among WEP, WPA, and WPA2 security, and describe other authentication and authorization issues that arise in the course of implementing a wireless LAN (WLAN).
Describe the role of routers in building a security infrastructure, and explain how ACLs function to create traffic filters.
Compare IPsec and SSL VPNs in terms of ease of implementation and security services provided, and the security services afforded by each technology.
Articulate the benefits of firewalls and application gateways within the overall security infrastructure.
> Direct link to course prerequisites.
> Buy your textbooks and other required course materials online from the Brandeis Bookstore ,or visit the bookstore in the Shapiro Campus Center.