Network Security

What is this subject about?

This paper aims to inculcate the knowledge of network security, wider infrastructure security, organisational security, cryptography, computer security, and other important security procedures and policies. This paper develops a critical understanding of network attacks, vulnerabilities, threats and defences against them through the network- and host-based security technologies and practice. This course will pave ways to validate the student’s ability to identify strategies for ensuring business continuity and disaster recovery.

You will be able to develop a keen understanding of network and computer security, related functions, protocols, principles and wireless networks security.

We will teach you how to:

a) Critically evaluate the security function and its purpose of network devices and technologies, identify commonly used default network ports and their goals.
b) Analyse and implement secure network administration principles, classify the available types of widely used protocols.
c) Distinguish and differentiate between Network Design Elements Distinguish and differentiate between Network Design Elements.
d) Assess and evaluate the procedure of the implementation of a wireless network in a secure manner.

You will be able to assess and analyse security compliance, incident response procedures and security risk mitigation strategies.

We will teach you how to:

a) Illustrate the various possible risk related concepts and appropriate risk mitigation strategies.
b) Critically understand the importance of security related awareness & training and execute the proper incident response procedures.
c) Compare and contrast the different aspects of business security continuity.
d) Examine and evaluate the proper use of environmental controls and its impact on business.
e) Analyse and assess the execution procedures of disaster recovery plans & procedures.
f) Demonstrate a comprehensive understanding of the concepts of Confidentiality, Integrity & Availability (CIA).

You will be able to comprehend internet security tools, techniques and methods through the implementation of Intrusion Detection System (IDS) using DNS and SNMP protocols.

We will teach you how to:

a) Compare and contrast the different types of attacks including Malware, Attacks, Social Engineering Attacks, Wireless Attacks, Application Attacks, Mitigation and Deterrent Techniques.
b) Demonstrate and implement the assessment tools & techniques to discover security threats & Vulnerabilities.
c) Critically evaluate the scope of Vulnerability Assessments, and investigate the uses of penetration testing vs. Vulnerability Scanning.
d) Demonstrate a thorough understanding of Intrusion Detection System (IDS), Network Device Exploitation, Switches, VLANs and Routers.
e) Critically analyse the Importance of DNS and SNMP Security, IP Spoofing, Hijacking and Denial of Service Attacks concepts

You will be able to analyse authentication and access control methods for intrusion detection and prevention alongside other vulnerability assessment procedures.

We will teach you how to:

a) Evaluate ​procedures to establish host security importance of data security.
b) Illustrate the function & purpose of authentication services, analyse and explain the fundamental concepts & best practices related to authentication, authorisation & access control. Illustrate the role & purpose of authentication services.
c) Demonstrate a comprehensive understanding of how to implement security controls when performing account management.
d) Evaluate the use of various vulnerability assessment tools and techniques implementation in business and analysis strategies for multiple risks.

You will be able to assess the security structure of an enterprise using disaster recovery planning, cryptographic tools, certificate management and backup strategies.

We will teach you how to:

a) Identify and summarise general cryptography concepts, the purpose of cryptographic tools and products.
b) Discuss and describe the core concepts of public critical infrastructure, the implementation of PKI, certificate management & associated components in organisational security.
c) Compare and Contrast between physical access controls, environmental and mobile device security.
d) Critically understand the concept of disaster recovery planning and how to implement vulnerability assessment tools and techniques.
e) Evaluate t​h​e-business continuity and available risk management methods; discuss the implementation method of incident response policy.
f) Illustrate the difference between fault tolerance and backup strategies; distinguish the multiple forensic investigations concept.
g) Outline corporate security policy, data handling in managerial security and demonstrate multiple DRPS and procedures in organisational security.

Share this post

Facebook
Twitter
LinkedIn

Other Related Information

Covid 19 Update
Uncategorized

COVID-19 Update

The Government has placed Auckland at Level 3 alert as a result of the current COVID-19 cluster that has its centre in Auckland. Tasman will introduce

Read More »
COVID-19

COVID-19 Update

The Government has placed Auckland at Level 3 alert as a result of the current COVID-19 cluster that has its centre in Auckland. Tasman will introduce

Read More »