Unit 3: Securing Networks
Unit Overview
Unit 3 focuses on network security, one of the most critical domains in cybersecurity. Students learn about common network vulnerabilities and attack methods, as well as the various technical and managerial controls used to protect network infrastructure. The unit emphasizes layered network defense strategies, including wireless security, network segmentation, firewall deployment, and intrusion detection systems.
Students engage with professional scenarios that simulate real-world network security challenges faced by cybersecurity professionals in organizational environments.
Lessons in This Unit
3.1 Network Vulnerabilities and Attacks
Identify and analyze common network-based attacks and vulnerabilities that threaten organizational network infrastructure.
3.2 Protecting Networks: Managerial Controls and Wireless Security
Learn about policy-based network security controls and specific measures for securing wireless network infrastructure.
3.3 Protecting Networks: Segmentation
Explore network segmentation strategies and how dividing networks into smaller segments can limit the impact of security breaches.
3.4 Protecting Networks: Firewalls
Understand firewall technologies, configurations, and their role in controlling network traffic and preventing unauthorized access.
3.5 Detecting Network Attacks
Learn about network monitoring tools and techniques used to identify and respond to malicious network activity.
Course Skills Emphasized
- Skill 1.A: Identify, with and without the support of AI, vulnerabilities, threats, and attack methods, and explain how they generate risk.
- Skill 1.B: Determine ways adversaries exploit vulnerabilities to compromise an asset.
- Skill 2.A: Identify security controls, and explain how they mitigate risks.
- Skill 2.B: Determine layered security controls that address vulnerabilities.
- Skill 3.A: Identify methods for monitoring systems, and explain how they detect attacks.
- Skill 3.B: Determine strategies and methods to detect attacks.
Key Topics Covered
- Network architecture and infrastructure security
- Common network attacks (man-in-the-middle, denial of service, packet sniffing)
- Wireless network security protocols and vulnerabilities
- Network segmentation and isolation strategies
- Firewall types, rules, and configuration
- Intrusion detection and prevention systems (IDS/IPS)
- Network access control (NAC) systems
- Virtual private networks (VPNs)
- Network monitoring and traffic analysis
- Security information and event management (SIEM) systems