Introductory Methods of Network Analysis
BASV/CYBV 326 provides students with a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network flayers support the upper ones. Students will use hands-on labs and exercises to investigate and analyze network fundamentals. CYBV/BASV 326 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements for networking principles.
The student will:
- Identify the major network components and protocols that enable communications and data transfer.
- Define and describe the principal characteristics, functions and protocols of the Application Layer, Transport Layer, Network Layer and Link Layer.
- Define and explain Wireless and mobile network architectures and protocols
- Explain the principles of computer security
- Exercise critical thinking strategies including reasoning, problem solving, analysis and evaluation by:
- Analyzing network traffic and their protocol and services
- Identifying and differentiating between connection and connectionless protocols
- Enumerating network architectures through active and passive mapping and scanning
- Using scanning techniques to determine the security posture of a network
The student will:
- Understand network traffic concepts flowing across various mediums, such as wired networks, wireless networks, and mobile networks
- Understand how network traffic is formatted and sent across these networks
- Understand, identify, and articulate attacks and mitigation strategies that occur against various protocols and network layers
- Be able to identify and analyze various elements of network traffic using network sniffing tools such as Wireshark. Students will conduct weekly exercises to capture, analyze, and develop a comprehensive report on their findings
- Understand how network traffic is secured and how attackers can manipulate how protocols and network structures work to develop and execute their attacks
- Complete a comprehensive final project that requires students to develop a network architecture, using a minimum of 20 concepts describe how a traffic request moves through the network, identify, describe, and provide mitigation techniques for four attacks that may be executed at each of the four layers of the TCP/IP model