This course is designed to introduce students to the foundational concepts and practical skills required in modern computer networks and cyber security. As the digital landscape continues to expand, the need for secure and efficient network infrastructure becomes paramount. Through this course, students will gain an understanding of how networks function, the vulnerabilities they face, and the tools and strategies used to protect them from cyber threats.
By the end of the course, students will be able to design, manage, and troubleshoot networks, as well as understand the importance of cyber security practices to protect sensitive data and infrastructure from malicious attacks. This course is perfect for individuals interested in entering the IT or cybersecurity fields, as it lays the groundwork for more advanced topics in both areas.
Course Objectives
3.Identify Cybersecurity Threats: Understand the different types of cyber threats, including malware, phishing, denialofservice (DoS) attacks, and insider threats.
Course Modules:
Overview of Computer Networks
Types of networks: LAN, WAN, and MAN
OSI Model and TCP/IP Stack
Basic networking hardware: Routers, switches, firewalls, and access points
IP Addressing and Subnetting
IPv4 and IPv6 addressing
Subnet masks and network configurations
Network Protocols and Services
Understanding protocols like TCP, UDP, DNS, HTTP, HTTPS, and FTP
How data is transmitted and routed in a network
Designing a Network
Planning for capacity and scalability
Wired vs. wireless networking
Routing and Switching
Routing protocols: RIP, OSPF, BGP
Switches, VLANs, and how they segment traffic
Network Monitoring and Troubleshooting
Tools like ping, traceroute, Wireshark for analyzing and diagnosing network issues
Introduction to Cybersecurity
Understanding the CIA triad (Confidentiality, Integrity, Availability)
Security threats: Malware, phishing, social engineering, and advanced persistent threats (APTs)
Cryptography Basics
Symmetric vs. asymmetric encryption
Public Key Infrastructure (PKI), SSL/TLS
Hashing, digital signatures, and certificate authorities
Firewalls and VPNs
Types of firewalls: Packetfiltering, Stateful, and Proxy firewalls
Virtual Private Networks (VPNs) for secure communication
Intrusion Detection and Prevention Systems (IDS/IPS)
Role of IDS/IPS in monitoring and preventing malicious activity
Realworld use cases and best practices
Secure Communication Protocols
Using HTTPS, SSL/TLS for secure data transmission
Secure email protocols: PGP, S/MIME
Cyberattack Lifecycle
Phases of a cyberattack: Reconnaissance, Exploitation, PostExploitation, and Covering Tracks
Common attack vectors and how attackers compromise networks
Incident Response Planning
Steps to take when a security breach occurs: Identification, Containment, Eradication, Recovery
Forensics: Investigating and analyzing security incidents
Network Automation and SDN (SoftwareDefined Networking)
Introduction to network automation tools and protocols
Benefits of SDN in simplifying network management
Ethical Hacking and Penetration Testing
Introduction to ethical hacking: Tools and techniques for testing network vulnerabilities
Legal and ethical considerations in cybersecurity
Practical Skills and Labs:
Handson Lab Activities:
Setting up and configuring routers, switches, and firewalls.
Configuring VPNs, monitoring network traffic using Wireshark, and analyzing packets.
Running network scans to detect vulnerabilities and applying patches.
Simulating cyberattacks in a controlled environment and performing penetration tests.
Assessment Methods:
Quizzes and Exams to test theoretical knowledge on networking concepts and cybersecurity protocols.
Handson Lab Assignments where students configure and troubleshoot networks, secure systems, and simulate cyberattacks.
Capstone Project: Design and implement a small secure network or perform a penetration test on a test network to showcase understanding of course concepts.
Prerequisites:
Basic knowledge of computers and operating systems (Windows/Linux).
No prior networking or cybersecurity experience is required, but familiarity with technology will be helpful.
Career Pathways after the Course:
This course can serve as a stepping stone for various roles in the IT and cybersecurity fields, including:
Network Administrator
Cybersecurity Analyst
IT Support Specialist
Penetration Tester
Security Consultant
Systems Engineer
