Skip to main content

Network Security

Network security is the implementation of processes used to protect a network from unauthorized access and misuse.

What is network security?

Network security is the implementation of processes used to protect a network from unauthorized access and misuse. The secure network processes and policies constitute best practices for organizations. The goal of network security is to ensure confidentiality, integrity, and availability (CIA Triangle).

Key Topics

  • Secure network design and implementation
  • Defensive Security Technologies and Techniques
  • Technical problem solving and troubleshooting
  • Blue Team Cybersecurity Roles
  • Technical writing and documentation
  • Project management

BYU CCDC Team

BYU has a long history of participating in the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC). Annually, students in the Cybersecurity program try out for a coveted place on the BYU CCDC Team. Once selected, students train together and strategize in preparation for the regional and potentially national competition levels.

CSA Head of Network Security

Ian Cook

June 04, 2021 12:50 PM
CSRL Lead Research Assistant, CSA Network Security Lead and CTF Group Lead

Courses

IT & CYBERSECURITY

  • IT&C 450 - Database Administration

    The role and responsibilities of database administrators. Database platform, architecture, and configuration; security and account management; backup, restore and disaster recovery; availability, access and performance; data migration. Learn more here.

  • IT&C 529 - Advanced Networking

    Analyzing, selecting, configuring, monitoring, and managing of computer network equipment. SNMP-based monitoring and control in process of fault isolation and root cause analysis. Learn more here.

  • IT&C 544 - System Administration

    Systems and network administration. User management. Server and workstation deployment and maintenance. Network Security. Infrastructure. Systems and infrastructure support. Cross-platform systems integration. Update and patch management. Mobile workforce services. Learn more here.

  • IT&C 548 - Cyber-Physical Systems

    Integration of technologies to develop computers and mobile devices that interact with the real world, including control and sensor interfaces. Incorporate IT core topics such as networks, security, and user-space experience design. Analysis and creation of cyber-physical and Internet-of-Things (IoT) systems. Learn more here.

  • IT&C 515R - Special Topics in Information Technology & Cybersecurity

    New topics in information technology for graduate and undergraduate students. Standard lecture and lab format. Learn more here.

  • IT&C 566 - Digital Forensics

    Fundamentals of digital forensics, legal issues, evidence, chain of custody, media analysis, incident response, corporate forensics, and network forensics. Learn more here.

INFORMATION SYSTEMS

  • IS 565 - Digital Forensics for Organizations

    Digital forensics from an organizational perspective, covering the three functions of digital forensics performed by businesses: employee abuse investigations, incident response, and electronic discovery. Learn more here.