{"id":858,"date":"2013-03-05T13:59:01","date_gmt":"2013-03-05T18:59:01","guid":{"rendered":"https:\/\/www.sunyit.edu\/apps\/catalog\/undergrad\/courses\/network-and-computer-security\/"},"modified":"2020-04-28T10:32:29","modified_gmt":"2020-04-28T14:32:29","slug":"network-and-computer-security","status":"publish","type":"page","link":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/courses\/network-and-computer-security\/","title":{"rendered":"Network and Computer Security"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\"><b>NCS 181 Introduction to Cybersecurity (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Introduction to the field of information system security.<span class=\"Apple-converted-space\">\u00a0 <\/span>The kinds of information system security threats that might be faced by home and\/or small business users and prudent security countermeasures used to counteract them are covered.<span class=\"Apple-converted-space\">\u00a0 <\/span>Security issues faced by users of information systems will be explained as well as the potential damage the may cause.<span class=\"Apple-converted-space\">\u00a0 <\/span>Provides the student with knowledge necessary to protect themselves against many of the information systems security threats faced in everyday life.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 205 Introduction to Linux (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Linux operating system fundamentals with a focus on system administration and networking services.<span class=\"Apple-converted-space\">\u00a0 <\/span>System administration topics include the Linux command line, managing users, shell scripting, system services, system hardening, and software installation.<span class=\"Apple-converted-space\">\u00a0 <\/span>Linux networking topics include networking services DNS, SSH, DHCP, routing, and security.<span class=\"Apple-converted-space\">\u00a0 <\/span>Significant time will be spent working with the command line on a Linux system.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: CS 100, CS 108, or equivalent.\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 210 Telecommunications Transmission Technology (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This course will familiarize students with the three principal transmission technologies used in data communications: copper wire, fiber optics, and radio frequency wireless.<span class=\"Apple-converted-space\">\u00a0 <\/span>Each physical layer medium is covered in detail to understand the nature of the communications channel it provides, and the impairments that affect data communications signals.<span class=\"Apple-converted-space\">\u00a0 <\/span>Transmission media standards, signaling, loss budgets, and the relative advantages and disadvantages of each transmission technology will be treated in detail.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>NCS 315 Networking of Information Systems (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">An introduction to networking of information systems with a focus on switching and routing basics, including basic switch and router configuration commands. Topics include physical media, network topologies, layered architecture (OSI, and TCP\/IP), Ethernet LANs, switch and router operation, IPv4 subnetting\/supernetting, TCP\/IP internetworking, routing protocols, WAN technologies, home networking, wireless networks, and an introduction to network security. Prerequisites MAT 115, CS 108, and either NCS 205 or CS 307.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 316 Data Network Design (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Data network design issues and applications, pointtopoint network design, multipoint network design, data collection and verification and an overview of protocols.<span class=\"Apple-converted-space\">\u00a0 <\/span>Network design tools such as ITGURU and OPNET are used for network design and simulation.<span class=\"Apple-converted-space\">\u00a0 <\/span>Use of simulation results to design a private line or packet switched based data communications network.<span class=\"Apple-converted-space\">\u00a0 <\/span>Three hours of lecture and one hour of laboratory per week.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites:<span class=\"Apple-converted-space\">\u00a0 <\/span>NCS 315 and STA 100.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 320 Information Assurance Fundamentals (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">A fast paced introduction to the field of Information Assurance.<span class=\"Apple-converted-space\">\u00a0 <\/span>The various kinds of threats that might be faced by an information system and the security techniques used to thwart them are covered.<span class=\"Apple-converted-space\">\u00a0 <\/span>Hacker methods, viruses, worms, and system vulnerabilities are described with respect to the actions that must be taken by a Network Manager to combat them.<span class=\"Apple-converted-space\">\u00a0 <\/span>The basics of cryptography are covered including hash functions, symmetric cryptography, public key cryptography, cryptography algorithms, and cryptographic applications in computer and network security.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: CS 108, and NCS 181 or equivalent. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>NCS 330 Information Assurance Ethics, Policies and Disaster Recovery (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">This course covers the development of information systems security policies for small and large organizations with specific regard to components such as email, web servers, web browsers, firewalls, and personal applications.<span class=\"Apple-converted-space\">\u00a0 <\/span>The course covers cyber ethical standards for information system users and administrators, and their role as a driver in developing disaster recovery plans and procedures are also covered.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: NCS 181 or equivalent.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 350 Wireless Systems and Security (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Covers wireless network technologies, with an emphasis on Wi-Fi standards and protocols, wireless LAN architectures, management, and security. Wireless hacking tools will be used to demonstrate vulnerabilities of various wireless protocols and implementations. In-class lab activities will focus on wireless system operation, deployment, and security. Supplementary reading materials will be assigned as needed throughout the semester to keep our coverage current with new developments in the field. Prerequisites: NCS 210 and NCS 315.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>NCS 384 Network Intrusion Detection (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The need for intrusion detection systems (IDS) is described.<span class=\"Apple-converted-space\">\u00a0 <\/span>Several basic IDS design approaches and implementation methods are presented.<span class=\"Apple-converted-space\">\u00a0 <\/span>Basic attack methods employed by network attackers and the resulting signatures are explained.<span class=\"Apple-converted-space\">\u00a0 <\/span>The business case for justifying the acquisition of IDS is explored.<span class=\"Apple-converted-space\">\u00a0 <\/span>Builds upon the foundations of Information Assurance covered in NCS 320.<span class=\"Apple-converted-space\">\u00a0 <\/span>Provides additional background and skills in the area of network IDS for those students interested in the areas of network and data security.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites:<span class=\"Apple-converted-space\">\u00a0 <\/span>NCS 315 and NCS 320.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 416 Digital and Internet Telephony (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Consists of both lecture and application oriented lab assignments.<span class=\"Apple-converted-space\">\u00a0 <\/span>Emphasizes digital and internet telephony fundamentals including the convergence of voice, data and multimedia communications using the Internet Protocol.<span class=\"Apple-converted-space\">\u00a0 <\/span>Three hours of lecture and two hours of laboratory.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisite:<span class=\"Apple-converted-space\">\u00a0 <\/span>NCS 210 and NCS 315.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 425 Internetworking (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Intended to introduce new content and extend previously learned networking skills which will empower students to enter the workforce and\/or further their education in the area of telecommunications networking.<span class=\"Apple-converted-space\">\u00a0 <\/span>A task analysis of current industry standards and occupational analysis is used in the development of content standards.<span class=\"Apple-converted-space\">\u00a0 <\/span>Instruction introduces and extends the student\u2019s knowledge and practical experience with switches.<span class=\"Apple-converted-space\">\u00a0 <\/span>Local area networks (LAN\u2019s) and Virtual Local Area Networks (VLAN\u2019s) design, configuration and maintenance.<span class=\"Apple-converted-space\">\u00a0 <\/span>Students develop practical experience in skills related to configuring LAN\u2019s, WAN\u2019s, routing protocols and network troubleshooting.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisite: IS 315.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 430 Penetration Testing (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">An in-depth hands-on experience in the area of Penetration testing. Students will study the fundamentals and key steps of a penetration test, as well as gain hands-on experience and exposure to the tools and methods utilized by networking security professionals while conducting white hat penetration tests in a controlled lab environment. A large portion of this course is based on hands-on red team activities that require the delivery of detailed documentation that outlines the processes employed in order to achieve the goals of the exercise. Prerequisites: NCS 315 and either NCS 205 or CS 307.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 435 Computer Forensics (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Introduction into the field of computer forensics in networked systems.<span class=\"Apple-converted-space\">\u00a0 <\/span>The student will receive training in the methods, techniques and tools used by those practicing computer forensics in support of audit, security privacy and legal functions.<span class=\"Apple-converted-space\">\u00a0 <\/span>Specific legal issues regarding seizure and chain of custody will be addressed.<span class=\"Apple-converted-space\">\u00a0 <\/span>Students will have opportunity to learn computer forensics applications, methods and procedures through hands-on lab activities.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: NCS 210, NCS 315, NCS 320.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 440 Virtualization (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">An in-depth look at the area of virtualization and related current research topics.<span class=\"Apple-converted-space\">\u00a0 <\/span>This will be accomplished through lecture and interactive discussion of research papers, as well as hands-on experience with virtualization technologies.<span class=\"Apple-converted-space\">\u00a0 <\/span>Topics include: Virtualization Concepts and Theory, Security, Networking, Performance and Storage.<span class=\"Apple-converted-space\">\u00a0 <\/span>Pre-requisites:<span class=\"Apple-converted-space\">\u00a0 <\/span>NCS 315, CS 307.\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 450 Network Security (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Detailed coverage of network threats, vulnerabilities and security protocols as countermeasures to advance the students\u2019 understanding of computer security, network security, e-mail and internet security.<span class=\"Apple-converted-space\">\u00a0 <\/span>Focus is on security issues across the entire network protocol stack from the physical to the application layer.<span class=\"Apple-converted-space\">\u00a0 <\/span>Specific topics include physical layer security, secure routing protocols, IPsec, SSH, TLS, Web security, authentication and key management, and network borne malware such as worms and viruses.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: NCS 315.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 460 Advanced Wireless Security (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Provides advanced coverage of wireless networks and the special security problems they pose.<span class=\"Apple-converted-space\">\u00a0 <\/span>Topics include measures taken to secure wireless personal area networks (PAN\u2019s), wireless LAN\u2019s, cellular wireless networks, and ad-hoc wireless networks.<span class=\"Apple-converted-space\">\u00a0 <\/span>Threats, vulnerabilities and countermeasures specific to each type of networks will be enumerated and studied in detail.<span class=\"Apple-converted-space\">\u00a0 <\/span>Coverage includes the use of cryptography and cryptographic primitives in secure protocols, wireless device security, and security policy management.<span class=\"Apple-converted-space\">\u00a0 <\/span>The treatment of ad-hoc wireless network security will cover secure routing protocols and intrusion detection systems.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: NCS 350, NCS 450.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>NCS 480 Internet of Things Security (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Covers the emerging topic of Internet-of-Things (loT) and the security issues surrounding their widespread deployment. The uses of loT devices in various environments such as home and enterprise will be analyzed from the security perspective. Students will evaluate and analyze loT device vulnerabilities, attacks, and countermeasures through both theoretical and hands-on-exercises. Issues addressed include privacy, identity, and access control. Selected hands-on activities will offer students practical experience in the field.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 470 Reverse Engineering (4)<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">An introduction to software reverse engineering, seeking to observe, monitor, understand, and modify the execution of computer software without the benefit of source code. Coverage includes assembly language programming basics, code and system monitoring tools, and both static and dynamic analyses of binary code. In-class labs will help to reinforce the knowledge gained from reading, discussion, and lectures.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>NCS 490 Special Topics in Network and Computer Security (4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">An in-depth study of selected topics based on: new developments in the field, more in-depth treatment of topics than covered in regular courses, or topics not normally covered in an undergraduate program in Network and Computer Security.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisites: NCS 210, NCS 320, and permission of the instructor.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>NCS 494 Network and Computer Security Internship\/Coop (2 or 4)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Parttime supervised experience in a professional atmosphere which supplements classroom instruction.<span class=\"Apple-converted-space\">\u00a0 <\/span>Two written reports on the work experience, two supervisor&#8217;s evaluations and one site interview required.<span class=\"Apple-converted-space\">\u00a0 <\/span>Required contact hours min. 150.<span class=\"Apple-converted-space\">\u00a0 <\/span>Prerequisite:<span class=\"Apple-converted-space\">\u00a0 <\/span>Permission of instructor.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>NCS 495 Network and Computer Security Capstone (2)<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Offers students the opportunity to demonstrate knowledge of network and computer security by completing and presenting a significant project. The topic should be of contemporary significance in the field. Periodic written and oral examinations are required. Prerequisites: Permission of the instructor. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NCS 181 Introduction to Cybersecurity (4) Introduction to the field of information system security.\u00a0 The kinds of information system security threats that might be faced by home and\/or small business users and prudent security countermeasures used to counteract them are covered.\u00a0 Security issues faced by users of information systems will be explained as well as [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":818,"menu_order":44,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-858","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/pages\/858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/comments?post=858"}],"version-history":[{"count":5,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/pages\/858\/revisions"}],"predecessor-version":[{"id":7836,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/pages\/858\/revisions\/7836"}],"up":[{"embeddable":true,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/pages\/818"}],"wp:attachment":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2020-2021\/wp-json\/wp\/v2\/media?parent=858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}