• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/12)
      • C4.1 (9/26)
      • C6.1 (10/10)
      • C8.1 (10/24)
      • C9.1 (10/31)
      • C10.1 (11/7)
      • C11.1 (11/14)
    • Practical Assignments
      • PA1.1 (Due 9/12)
      • PA2.1 (Due 9/26)
      • PA4.1 (Due 10/3)
      • PA5 (Due 10/17)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/31)
      • PA9.1 (Due 11/7)
      • PA10.1 (Due 11/7)
      • PA11.1 ( Due 11/24)
      • PA12.1 (Due 11/28)
      • PA13 (Due 12/5)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/19)
      • WA3.1 (Due 9/26)
      • WA4.1 (Due 10/3)
      • WA6.1 (Due 10/17)
      • WA8.1 (Due 10/31)
      • WA9.1 (Due 11/7)
      • WA10.1 (Due 11/14)
      • WA12.1 (Due 11/28)
      • WA13.1 (Due 12/5)
  • Webex
  • Gradebook

ITACS 5209

Temple University

12/5 – Telecommunications and Network Security

Overview

In this section, we will continue discussing networks, with a focus on how to secure network infrastructure, and ensure that our networks provide secure and reliable access to information.

We will review various network attack methods, and discuss the tools and techniques to detect and prevent these threats such as firewalls, proxy servers, and intrusion detection systems.

The (ISC)2 Common Body of Knowledge (CBK) defines the key areas of knowledge for telecommunications and network security in this way:

Telecommunications and Network Security domain encompasses the structures, techniques, transport protocols, and security measures used to provide integrity, availability, confidentiality and authentication for transmissions over private and public communications networks.

The candidate is expected to demonstrate an understanding of communications and network security as it relates to data communications in local area and wide area networks, remote access, internet/intranet/extranet configurations. Candidates should be knowledgeable with network equipment such as switches, bridges and routers, as well as networking protocols (e.g., TCP/IP, IPsec), and VPNs.

Key areas of knowledge:

 

  • Establish secure network architecture and design (e.g., IP and non-IP protocols, segmentation)
  • Securing network components
  • Establish secure communication channels (e.g., VPN, TLS/SSL, VLAN)
  • Understand network attacks (e.g., DDoS, spoofing)

 

This week’s topics:

  • Wired and Wireless Network Technologies
  • Network Authentication, Access Control
  • Firewalls
  • Virtual Private Networks
  • Intrusion Detection Systems

 

In this unit, plan to:

  • Read: pages 459-568 in the Network Security text
  • Read: pages 405-412 in the Security Essentials text
  • Complete: this week’s written assignment
  • Complete: this week’s practical assignments
  • Participate: in the weekly discussion forum

Written Assignment

Practical Assignment Part 1

Practical Assignment Part 2

Practical Assignment Part 3

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in