{"id":858,"date":"2013-03-05T13:59:01","date_gmt":"2013-03-05T18:59:01","guid":{"rendered":"https:\/\/www.sunyit.edu\/apps\/catalog\/undergrad\/courses\/network-and-computer-security\/"},"modified":"2023-07-05T15:19:51","modified_gmt":"2023-07-05T19:19:51","slug":"network-and-computer-security","status":"publish","type":"page","link":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/courses\/network-and-computer-security\/","title":{"rendered":"Network and Computer Security"},"content":{"rendered":"<p><strong>NCS 181\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Cybersecurity (4)<\/strong><\/p>\n<p>Introduction to the field of information system security.\u00a0 The kinds of information system security threats that might be faced by home and\/or small business users and prudent security countermeasures used to counteract them are covered.\u00a0 Security issues faced by users of information systems will be explained as well as the potential damage the may cause.\u00a0 Provides the student with knowledge necessary to protect themselves against many of the information systems security threats faced in everyday life.<\/p>\n<p><strong>NCS 205\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Linux (4)<\/strong><\/p>\n<p>Linux operating system fundamentals with a focus on system administration and networking services.\u00a0 System administration topics include the Linux command line, managing users, shell scripting, system services, system hardening, and software installation.\u00a0 Linux networking topics include networking services DNS, SSH, DHCP, routing, and security.\u00a0 Significant time will be spent working with the command line on a Linux system.\u00a0 Prerequisites: CS 100, CS 108, or equivalent.<\/p>\n<p><strong>NCS 210\u00a0\u00a0\u00a0\u00a0\u00a0 Telecommunications Transmission Technology (4)<\/strong><\/p>\n<p>This course will familiarize students with the three principal transmission technologies used in data communications: copper wire, fiber optics, and radio frequency wireless.\u00a0 Each physical layer medium is covered in detail to understand the nature of the communications channel it provides, and the impairments that affect data communications signals.\u00a0 Transmission media standards, signaling, loss budgets, and the relative advantages and disadvantages of each transmission technology will be treated in detail.<\/p>\n<p><strong>NCS 315\u00a0\u00a0\u00a0\u00a0\u00a0 Networking of Information Systems (4)<\/strong><\/p>\n<p>An introduction to networking of information systems with a focus on switching and routing basics, including basic switch and router configuration commands. Topics include physical media, network topologies, layered architecture (OSI, and TCP\/IP), Ethernet LANs, switch and router operation, IPv4 subnetting\/supernetting, TCP\/IP internetworking, routing protocols, WAN technologies, home networking, wireless networks, and an introduction to network security. Prerequisites MAT 115 or MAT 413, and CS 108.<\/p>\n<p><strong>NCS 316\u00a0\u00a0\u00a0\u00a0\u00a0 Data Network Design (4)<\/strong><\/p>\n<p>Data network design issues and applications, point\u2011to\u2011point network design, multipoint network design, data collection and verification and an overview of protocols.\u00a0 Network design tools such as ITGURU and OPNET are used for network design and simulation.\u00a0 Use of simulation results to design a private line or packet switched based data communications network.\u00a0 Three hours of lecture and one hour of laboratory per week.\u00a0 Prerequisites:\u00a0 NCS 315 and STA 100.<\/p>\n<p><strong>NCS 320\u00a0\u00a0\u00a0\u00a0\u00a0 Information Assurance Fundamentals (4)<\/strong><\/p>\n<p>A fast paced introduction to the field of Information Assurance.\u00a0 The various kinds of threats that might be faced by an information system and the security techniques used to thwart them are covered.\u00a0 Hacker methods, viruses, worms, and system vulnerabilities are described with respect to the actions that must be taken by a Network Manager to combat them.\u00a0 The basics of cryptography are covered including hash functions, symmetric cryptography, public key cryptography, cryptography algorithms, and cryptographic applications in computer and network security.\u00a0 Prerequisites: CS 108, NCS 181, and NCS 205.<\/p>\n<p><strong>NCS 330\u00a0\u00a0\u00a0\u00a0\u00a0 Information Assurance Ethics, Policies and Disaster Recovery (4)<\/strong><\/p>\n<p>This course covers the development of information systems security policies for small and large organizations with specific regard to components such as email, web servers, web browsers, firewalls, and personal applications.\u00a0 The course covers cyber ethical standards for information system users and administrators, and their role as a driver in developing disaster recovery plans and procedures are also covered.\u00a0 Prerequisites: NCS 181 or equivalent.<\/p>\n<p><strong>NCS 350\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Systems and Security (4)<\/strong><\/p>\n<p>Covers wireless network technologies, with an emphasis on Wi-Fi standards and protocols, wireless LAN architectures, management, and security. Wireless hacking tools will be used to demonstrate vulnerabilities of various wireless protocols and implementations. In-class lab activities will focus on wireless system operation, deployment, and security. Supplementary reading materials will be assigned as needed throughout the semester to keep our coverage current with new developments in the field. Prerequisites: NCS 210 and NCS 315.<\/p>\n<p><strong>NCS 384\u00a0\u00a0\u00a0\u00a0\u00a0 Network Intrusion Detection (4)<\/strong><\/p>\n<p>The need for intrusion detection systems (IDS) is described.\u00a0 Several basic IDS design approaches and implementation methods are presented.\u00a0 Basic attack methods employed by network attackers and the resulting signatures are explained.\u00a0 The business case for justifying the acquisition of IDS is explored.\u00a0 Builds upon the foundations of Information Assurance covered in NCS 320.\u00a0 Provides additional background and skills in the area of network IDS for those students interested in the areas of network and data security.\u00a0 Prerequisites:\u00a0 NCS 315 and NCS 320.<\/p>\n<p><strong>NCS 416\u00a0\u00a0\u00a0\u00a0\u00a0 Digital and Internet Telephony (4)<\/strong><\/p>\n<p>Consists of both lecture and application oriented lab assignments.\u00a0 Emphasizes digital and internet telephony fundamentals including the convergence of voice, data and multimedia communications using the Internet Protocol.\u00a0 Three hours of lecture and two hours of laboratory.\u00a0 Prerequisite:\u00a0 NCS 210 and NCS 315.<\/p>\n<p><strong>NCS 425\u00a0\u00a0\u00a0\u00a0\u00a0 Internetworking (4)<\/strong><\/p>\n<p>Intended to introduce new content and extend previously learned networking skills which will empower students to enter the workforce and\/or further their education in the area of telecommunications networking.\u00a0 A task analysis of current industry standards and occupational analysis is used in the development of content standards.\u00a0 Instruction introduces and extends the student\u2019s knowledge and practical experience with switches.\u00a0 Local area networks (LAN\u2019s) and Virtual Local Area Networks (VLAN\u2019s) design, configuration and maintenance.\u00a0 Students develop practical experience in skills related to configuring LAN\u2019s, WAN\u2019s, routing protocols and network troubleshooting.\u00a0 Prerequisite: IS 315.<\/p>\n<p><strong>NCS 430\u00a0\u00a0\u00a0\u00a0\u00a0 Penetration Testing (4)<\/strong><\/p>\n<p>An in-depth hands-on experience in the area of Penetration testing. Students will study the fundamentals and key steps of a penetration test, as well as gain hands-on experience and exposure to the tools and methods utilized by networking security professionals while conducting white hat penetration tests in a controlled lab environment. A large portion of this course is based on hands-on red team activities that require the delivery of detailed documentation that outlines the processes employed in order to achieve the goals of the exercise. Prerequisites: NCS 315 and either NCS 205 or CS 307.<\/p>\n<p><strong>NCS 435\u00a0\u00a0\u00a0\u00a0\u00a0 Computer Forensics (4)<\/strong><\/p>\n<p>Introduction into the field of computer forensics in networked systems.\u00a0 The student will receive training in the methods, techniques and tools used by those practicing computer forensics in support of audit, security privacy and legal functions.\u00a0 Specific legal issues regarding seizure and chain of custody will be addressed.\u00a0 Students will have opportunity to learn computer forensics applications, methods and procedures through hands-on lab activities.\u00a0 Prerequisites: NCS 210, NCS 315, NCS 320.<\/p>\n<p><strong>NCS 440\u00a0\u00a0\u00a0\u00a0\u00a0 Virtualization (4)<\/strong><\/p>\n<p>An in-depth look at the area of virtualization and related current research topics.\u00a0 This will be accomplished through lecture and interactive discussion of research papers, as well as hands-on experience with virtualization technologies.\u00a0 Topics include: Virtualization Concepts and Theory, Security, Networking, Performance and Storage.\u00a0 Pre-requisites:\u00a0 NCS 315, CS 307.<\/p>\n<p><strong>NCS 450\u00a0\u00a0\u00a0\u00a0\u00a0 Network Security (4)<\/strong><\/p>\n<p>Detailed coverage of network threats, vulnerabilities and security protocols as countermeasures to advance the students\u2019 understanding of computer security, network security, e-mail and internet security.\u00a0 Focus is on security issues across the entire network protocol stack from the physical to the application layer.\u00a0 Specific topics include physical layer security, secure routing protocols, IPsec, SSH, TLS, Web security, authentication and key management, and network borne malware such as worms and viruses.\u00a0 Prerequisites: NCS 315.<\/p>\n<p><strong>NCS 460\u00a0\u00a0\u00a0\u00a0\u00a0 Advanced Wireless Security (4)<\/strong><\/p>\n<p>Provides advanced coverage of wireless networks and the special security problems they pose.\u00a0 Topics include measures taken to secure wireless personal area networks (PAN\u2019s), wireless LAN\u2019s, cellular wireless networks, and ad-hoc wireless networks.\u00a0 Threats, vulnerabilities and countermeasures specific to each type of networks will be enumerated and studied in detail.\u00a0 Coverage includes the use of cryptography and cryptographic primitives in secure protocols, wireless device security, and security policy management.\u00a0 The treatment of ad-hoc wireless network security will cover secure routing protocols and intrusion detection systems.\u00a0 Prerequisites: NCS 350, NCS 450.<\/p>\n<p><strong>NCS 470\u00a0\u00a0\u00a0\u00a0\u00a0 Reverse Engineering (4)<\/strong><\/p>\n<p>An introduction to software reverse engineering, seeking to observe, monitor, understand, and modify the execution of computer software without the benefit of source code. Coverage includes assembly language programming basics, code and system monitoring tools, and both static and dynamic analyses of binary code. In-class labs will help to reinforce the knowledge gained from reading, discussion, and lectures.<\/p>\n<p><strong>NCS 480\u00a0\u00a0\u00a0\u00a0\u00a0 Internet of Things Security (4)<\/strong><\/p>\n<p>Covers the emerging topic of Internet-of-Things (loT) and the security issues surrounding their widespread deployment. The uses of loT devices in various environments such as home and enterprise will be analyzed from the security perspective. Students will evaluate and analyze loT device vulnerabilities, attacks, and countermeasures through both theoretical and hands-on-exercises. Issues addressed include privacy, identity, and access control. Selected hands-on activities will offer students practical experience in the field.<\/p>\n<p><strong>NCS 484\u00a0\u00a0\u00a0\u00a0\u00a0 Undergraduate Supervised Research (1-4)<\/strong><\/p>\n<p>Supervised participation and research in an established cybersecurity project designed for the advanced undergraduate student who desires to engage in research. This participation and research must build upon related prior academic achievement and experience. Students must submit a written research report detailing their results and corresponding analyses upon course completion. Course may be repeated for up to a total of 4 credit hours, but each registration must be for an approved cybersecurity project. Prerequisites: permission of supervising instructor.<\/p>\n<p><strong>NCS 490\u00a0\u00a0\u00a0\u00a0\u00a0 Special Topics in Network and Computer Security (4)<\/strong><\/p>\n<p>An in-depth study of selected topics based on: new developments in the field, more in-depth treatment of topics than covered in regular courses, or topics not normally covered in an undergraduate program in Network and Computer Security.\u00a0 Prerequisites: NCS 210, NCS 320, and permission of the instructor.<\/p>\n<p class=\"x_MsoNormal\"><b><span class=\"x_ContentPasted0\">NCS 494\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Network and Computer Security Internship\/Co\u2011op (2 or 4)\u00a0<\/span><\/b><\/p>\n<p class=\"x_MsoNormal\"><span class=\"x_ContentPasted0\">Students can take advantage of opportunities that help them gain practical experience within the objectives of their program of study. The goals of the internship are threefold: 1) to allow the student to apply knowledge acquired in coursework to a &#8220;real world&#8221; environment; 2) to further develop the student&#8217;s awareness of his\/her career opportunities in the cybersecurity field; and 3) to enhance the student&#8217;s cybersecurity experience to become a more attractive job candidate upon graduation by emphasizing communications and interpersonal skills. The NCS Internship can be repeated for credit, with the instructor&#8217;s permission, and with the stipulation that it can only be taken once to satisfy NCS Advanced Elective credit requirements. Permission of instructor required.<\/span><\/p>\n<p><strong>NCS 495\u00a0\u00a0\u00a0\u00a0\u00a0 Network and Computer Security Capstone (2)<\/strong><\/p>\n<p>Offers students the opportunity to demonstrate knowledge of network and computer security by completing and presenting a significant project. The topic should be of contemporary significance in the field. Periodic written and oral examinations are required. Prerequisites: Permission of the instructor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NCS 181\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Cybersecurity (4) Introduction to the field of information system security.\u00a0 The kinds of information system security threats that might be faced by home and\/or small business users and prudent security countermeasures used to counteract them are covered.\u00a0 Security issues faced by users of information systems will be explained as well as [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":818,"menu_order":44,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-858","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/pages\/858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/comments?post=858"}],"version-history":[{"count":10,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/pages\/858\/revisions"}],"predecessor-version":[{"id":8478,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/pages\/858\/revisions\/8478"}],"up":[{"embeddable":true,"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/pages\/818"}],"wp:attachment":[{"href":"https:\/\/webapp.sunypoly.edu\/undergrad-catalog-2023-2024\/wp-json\/wp\/v2\/media?parent=858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}