Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.
This course may not be repeated for credit.
Prerequisite(s)
- Admission to the Graduate Certificate in Network Security or the Master of Information Security and Privacy.
Sections
| LEC 1 | MTWRF 09:00 - 17:00
| | Michelle Cheatham | | |
| Notes:
Students will participate in a combination of synchronous and asynchronous instruction for the entire duration of the month. Please refer to your Course Outline for further scheduling details. |
| LEC 2 | MTWRF 09:00 - 17:00
| | Michelle Cheatham | | |
| Notes:
Students will participate in a combination of synchronous and asynchronous instruction for the entire duration of the month. Please refer to your Course Outline for further scheduling details. |