This course builds on the foundation of LAN security and forensic techniques established in FSCT 8540: Computer Security Networks 1. More advanced TCP/IP topics will be covered in a practical hands-on environment. The goal of this course is to address current network attacks and exploits in the real world, and the security strategies widely used to protect the network environment. Students will learn about common IP-based attacks and manipulations, network traffic analysis, perimeter defense through firewall design and implementation, Intrusion Detection Systems (IDS) as well as network monitoring. Throughout this course, extensive hands-on exercises provide the students with practical experience in using and implementing packet filters, firewalls, IDS and network monitoring, coupled with good understanding of hacker tools and exploits and how to defend against them.
Admission to a Forensic credential program or permission of the Program Coordinator.
* No class on Feb 10, Stats Holiday.* For authorization to register please contact Kristina Urban, Program Assistant, Forensics, at Kristina_Urban@bcit.ca. For details on textbook required (which will be available for purchase at the Bookstore approximately 6 weeks prior to the course start-date), please check: www.bcit.ca/bookstore/ For information on Forensic programs and courses, visit: www.bcit.ca/cas/forensics .
This course offering is in progress. Please check back next term or subscribe to receive email updates.
Upon successful completion of this course, the student will be able to:
Understand the computer security strategies.
Understand common network-based attacks and network protection technologies.
Acquire an in-depth understanding of the TCP/IP protocol suite.
Describe different firewall technologies, their respective usages, and able to implement accordingly.
Implement an adequate perimeter defence strategy based on security principles and best practices.
Understand and implement IDS systems as part of the network defence structure.
FSCT 8560 is offered as a part of the following programs:
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
No information on books is currently available for Spring/Summer 2014 offerings of this course.
Interested in being notified about future offerings of FSCT 8560 - Computer Security Networks 2? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.