Loading...

Course Description

This course provides reinforced learning on cybersecurity topics and builds from prior network defense courses. Reviewed topics include networking topologies; physical and network security; data protection; tools used to scan, protect, and test networks; network policies and procedures; and mitigation of network and operating system vulnerabilities.

This undergraduate course is 5 weeks.

PLEASE NOTE:
Attendance and participation are mandatory in all university courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

Course Objectives

In this course you will learn to:

  • Outline the fundamental steps for creating and implementing a security policy for access control as part of a recommendation for implementation.
  • Assess the various categories of firewall logs and determine how they are used to protect the organization’s network as part of a firewall implementation plan.
  • Analyze current threats and attacks on VPN security and determine methods for defending against attacks as part of a VPN implementation plan.

Disclaimers

The University of Phoenix reserves the right to modify courses.

While widely available, not all programs are available to residents of all states. Please check with an Enrollment Representative.

Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.

If you have a question contact us at 866-354-1800.

This course belongs to the following bundles offer:

Loading...

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please use our course search feature to find available courses. 

Required fields are indicated by .