The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
Lake Washington Institute of Technology    
  Jan 22, 2018
Catalog 2016-2017 [ARCHIVED CATALOG]

CSNT 241 Network Security and Encryption

6 credits
In this course students will examine packet structures, routing and access control lists, authentication and encryption, network traffic monitoring, and intrusion detection techniques. Additional subjects will include security and acceptable use policies, and gathering data to support forensic reviews.

Prerequisites: CSNT 251  and CSNT 253  or instructor permission

Corequisites: CSNT 244  and CSNT 246  

Quarters Offered: Winter, Spring

Global Outcome(s)
This course teaches to the global outcome of Communication.

Student Outcomes/Competencies:
Upon successful completion of this course students will be able to:

  • Compare and contrast network security vs. computer security
  • Demonstrate an understanding of the network security terminologies
  • Define access control methods and their proper applications
  • Describe vulnerabilities and attacks, and measures used to protect against them
  • Explain the basic concepts of cryptography and public key infrastructure
  • Define authentication methods and their proper applications
  • Define and apply network infrastructure security, including wireless networking
  • Apply methods to harden hardware, applications, and networks
  • Correctly deploy network monitoring, analysis, and sniffing tools
  • Define auditing and intrusion detection and protection systems
  • Define common methods to enhance communications security and internet services security
  • Define and understand the concepts of operational security and security planning, including business continuity, physical security, and incident response
  • Comply with End User Licensing Agreements (EULA)
  • Create acceptable use and security policies