The aim of this course is to provide students with in depth knowledge and skill of the bits-in-transit aspect of network security, including defining a network, exploring routers, routing & ACL basics, traffic analysis, perimeter defence & NIDS weaknesses, authentication, and virtual private networks.
Please note that the final week of the M6-108-A-19 will be held 29 Apr-3 May 19
If no seats are available, you may have your agency POC send a seat waiting list request.
Please click on the POC Finder
to obtain the contact information of your agency POC.
Describe Patterns and Protocols of Normal Network Traffic:
Based on lectures, classroom and online discussions, videos, online labs, quizzes, and assignments, students will describe the patterns and protocols of “normal” network traffic, and of many cues that can be used to recognize malicious/attack traffic, in accordance with the guidelines provided by the course material.
Demonstrate Rudiments of Firewalls:
Based on lectures, classroom and online discussions, videos, online labs, quizzes, and assignments, students will demonstrate the rudiments of firewall deployment and rule-writing, and the proper application of cryptographic mechanisms to achieve either of the INFOSEC objectives of confidentiality and integrity, in accordance with the guidelines provided by the course material.
Explain Role and Function of PKI:
Based on lectures, classroom and online discussions, videos, online labs, quizzes, and assignments, students will explain the role and function of PKI, and the various methods used to perform e-authentication, in accordance with the guidelines provided by the course material.
Describe Key Principles of Security Pradigms:
Based on understanding and appreciation of eight particular security paradigms/areas, students will be able to describe the following: 1) principle of least privilege, 2) reducing the target surface area, 3) Kerckhoff’s Principle, 4) risk management, 5) defense-in-depth, 6) proof-of-possession of secrets, 7) key management, and 8) security protocol handshakes/negotiations, in accordance with the guidelines provided by the course material.
This is a technical course that requires a modicum of technical education and/or experience background. The target audience is personnel those work responsibilities require – or would benefit from – both a broad “foundational” overview and moderately deep technical understanding of security issues related to the movement of data between nodes of a communications/ network system. Security managers should benefit from the technical insights that facilitate informed decision-making and better communications with technicians and engineers. Security technicians and engineers should benefit from the big picture that provides grounding and context for what is often narrowly focused, task-oriented, work. No rank requirement.
||English 3333 IAW STANAG 6001
||NCO: No restrictions
Officer: No restrictions
This ten-week course is a mix of lectures, classroom seminar-style discussions, question & answer (Q&A) assignments, videos, online discussions, labs, and quizzes. Labs provide practical experience with network functionality. A final summative exam that demonstrates skill and knowledge is required. This course is designed so that the majority of the resources used in the teaching of the course will be supplied from NPS instructor’s materials, delivered online (via PowerPoint presentations and videos), supplemented with classroom discussions. The student's time will average 4 to 5 hours a week during the Distance Learning (DL) segment of the course, mostly lab projects, tests, quizzes, assignments, and discussions forums.
This course involves one week resident training at NATO school followed by 8 weeks of distance learning followed by one more week at NATO school.