Network security is the implementation of processes used to protect a network from unauthorized access and misuse.
What is network security?
Network security is the implementation of processes used to protect a network from unauthorized access and misuse. The secure network processes and policies constitute best practices for organizations. The goal of network security is to ensure confidentiality, integrity, and availability (CIA Triangle).
- Secure network design and implementation
- Defensive Security Technologies and Techniques
- Technical problem solving and troubleshooting
- Blue Team Cybersecurity Roles
- Technical writing and documentation
- Project management
BYU CCDC Team
BYU has a long history of participating in the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC). Annually, students in the Cybersecurity program try out for a coveted place on the BYU CCDC Team. Once selected, students train together and strategize in preparation for the regional and potentially national competition levels.
CSA Head of Network Security
IT & CYBERSECURITY
IT&C 450 - Database Administration
The role and responsibilities of database administrators. Database platform, architecture, and configuration; security and account management; backup, restore and disaster recovery; availability, access and performance; data migration. Learn more here.
IT&C 529 - Advanced Networking
Analyzing, selecting, configuring, monitoring, and managing of computer network equipment. SNMP-based monitoring and control in process of fault isolation and root cause analysis. Learn more here.
IT&C 544 - System Administration
Systems and network administration. User management. Server and workstation deployment and maintenance. Network Security. Infrastructure. Systems and infrastructure support. Cross-platform systems integration. Update and patch management. Mobile workforce services. Learn more here.
IT&C 548 - Cyber-Physical Systems
Integration of technologies to develop computers and mobile devices that interact with the real world, including control and sensor interfaces. Incorporate IT core topics such as networks, security, and user-space experience design. Analysis and creation of cyber-physical and Internet-of-Things (IoT) systems. Learn more here.
IT&C 515R - Special Topics in Information Technology & Cybersecurity
New topics in information technology for graduate and undergraduate students. Standard lecture and lab format. Learn more here.
IT&C 566 - Digital Forensics
Fundamentals of digital forensics, legal issues, evidence, chain of custody, media analysis, incident response, corporate forensics, and network forensics. Learn more here.
IS 565 - Digital Forensics for Organizations
Digital forensics from an organizational perspective, covering the three functions of digital forensics performed by businesses: employee abuse investigations, incident response, and electronic discovery. Learn more here.