A Computer and Network Security Primer

computer and network security

Every organization has an urgent need to keep systems and computer and network security top-notch to protect their important data and operational functions. As such, information security is now listed among the most fast-growing occupations in the U.S. Bureau of Labor Statistics. Wilmington University offers a wide range of programs for professionals looking to enhance their knowledge and skill sets, as well as those who are interested in keeping their skills sharp.

Pursuing a Bachelor s Degree in Computer and Network Security at this university ensures that you will receive both theoretical and practical education on the latest software and hardware, network security techniques, how to keep hackers from invading your system and much more. As well, pursuing a Bachelor s Degree at this university will put you in an excellent position to get a rewarding career in the IT field!

An Overview

A person wearing a neck tie

The Bachelor s degree course provides students the knowledge and skills required to understand and execute the requirements of security policies. Students learn to integrate security into daily operations, developing security policies that meet the specific needs of organizations. This course also helps students to communicate effectively, implement controls and secure networks. The four main aspects of computer and network security include integrity, availability, authentication and resilience.

This course provides an introduction to the many components involved in implementing an effective network security policy. The program teaches students the importance of choosing the appropriate operating system, maintaining proper security, creating policies that address these components and configuring hardware that meets recommended security standards. Throughout this course students are provided a comprehensive review of all of the topics covered and are given a chance to practice implementing each policy using real life scenarios. The final exam consists of multiple-choice questions that are based on the content covered throughout the course. The final exam is also a self-grading exam and allows students to complete the curriculum completely.

Network Security Primer Facts

A laptop computer sitting on top of a keyboard

This course focuses on the application of the security policies that are established in the Windows Server 2021 environment. It introduces IT professionals to the different security models that exist in this environment and how they can be used to enhance network security. The primary focus of this class is to provide IT professionals with an overview of the Windows security models and their security implications. The practical application includes the development of different security policies, monitoring and reporting policies, and the use of intrusion detection and proofing technologies.

This course focuses on designing computer security policies that can address both attacks and countermeasures. The objectives of this class include building a solid infrastructure to minimize threats, preventing unauthorized access, tracking the source of attacks, and performing preventative measures. The two primary security models that are used in this class include intrusion detection and proofing, with the latter being a part of the security policies that are set in Windows. In the later portion of the course, students learn about data integrity, which is an important component of data security. It is important for organizations to adopt the right computer security strategies in order to avoid the cost and downtime associated with malicious attacks.

The Security Education Program Timeline

The first half of the six-week course, the Introduction to Windows Security, covers the history of the field and its development. This part of the course provides IT professionals with an overview of Windows’ architecture and various components of the OS. The purpose of this segment is to familiarize students with Windows security tools and how to use them to perform risk assessment and penetration testing. Throughout this section, students must already have a basic understanding of the Windows firewall and antivirus programs. Security consultants can also be consulted for assistance with specific computer security issues.

The second half of the six-week Information Security Education Program (ISEP) series provides students with an in-depth look at information security topics. Students learn about computer systems and the ways that hackers attack them. It begins with an in-depth review of the basics of information systems, then goes into more detail on areas such as web exploitation, file protection, email hacking, and Bluetooth information security. Once students have completed this portion of the course, they are required to create their own hacking team to execute their destructive hacks. This final part of the six-week program gives students the ability to apply their hacking skills and to analyze their results.

Bottom Line

Students who successfully completed the six-week Information Security Education Program (ISEP) are eligible to take the third installment of the series, which examines the applications of applied cryptography. Applied Cryptography is a subtopic of computer and network security, and students learn the same concepts that they learned in the previous modules. This section requires a more in-depth review of the literature on applied cryptography and the cryptographers who designed the protocols that protect information. Students will be required to research different software programs and how to compromise them using open source software.

Subscribe to our monthly Newsletter
Subscribe to our monthly Newsletter