Current location - Education and Training Encyclopedia - University rankings - Network security course objectives

(1) What are the special courses for information security?

As a student majoring in information security.

Let me talk about my understanding of inf

Network security course objectives

(1) What are the special courses for information security?

As a student majoring in information security.

Let me talk about my understanding of inf

Network security course objectives

(1) What are the special courses for information security?

As a student majoring in information security.

Let me talk about my understanding of information security.

As a freshman in Macey, I am currently exposed to professional courses such as Introduction to Information Security, Information Security Psychology, JAVA, C Language, Number (nan), Data (de) and Structure (yi) (pi).

The rest are basic courses, such as: advanced mathematics, line generation, big things, English, ideology and politics, history (who says science students don't have to study liberal arts! )

It sounds a lot and difficult, but when you learn it, you will find it (really difficult)! ! !

⑵ What courses does network security mainly include?

The network security course * * * is divided into 12 parts, namely: security basics; System security (Windows &; Linux); Hacker attack and defense, malicious code; Communication security; Common application protocol threats; WEB& script attack technology; Firewall technology (firewall); Intrusion detection system technology (IDS); Encryption &; VPN technology; Product safety; Safety management.

Network security means that the hardware and software of the network system and the data in the system are protected from being destroyed, changed or leaked due to unexpected or malicious reasons, and the system runs continuously, reliably and normally without interrupting the network service.

(3) What are the network security training courses?

Cyberlab's network security course is divided into 12 parts, namely: security foundation; System security (Windows &; Linux); Hacker attack and defense, malicious code; Communication security; Common application protocol threats; WEB& script attack technology; Firewall technology (firewall); Intrusion detection system technology (IDS); Encryption &; VPN technology; Product safety; Safety management. You can get to know it.

(4) What courses should students take in network security?

1. firewall (correct configuration and daily application)

2. System security (server security reinforcement, WEB code security reinforcement, establishment of various application servers, such as WEB MAIL FTP, etc. ).

3. Security audit (intrusion detection. Log tracking)

4.CCNA course (basic knowledge of network. Troubleshooting and formation of common LAN)

5. Experience accumulation.

⑸ Network Security Technology Course Scheme Design

Contact safety management experts with Shuang Ling Network to help you solve some problems.

Mainly to achieve network security management, enterprise firewall. Internet time is restricted by firewall, and students' mental health development is realized by online behavior management, and keywords and file suffixes are identified at the same time. Monitor all personnel's online behavior management, prevent staff from playing QQ stock trading software at work, control network traffic and so on! However, it may take you a week to design this scheme, which may not be enough, because you have to do research and understand the existing network topology.

[6] What courses do you need to study in university network security engineering?

Many C languages, HTML, data structures, passwords, databases, infrastructure (electromagnetic shielding, physical isolation, gateways, etc. ), firewall settings, routing security, network planning security, IPS, communication protocols, etc. There is a long way to go. . . . . . . . . Struggle in the middle

(7) What courses does computer network security include?

Too many, network protocols, firewalls, intrusion detection, antivirus, Windows/Linux/Unix/ other system attacks, Web attacks, DOS/DDOS attacks, LAN attacks, step-by-step infiltration, email attacks, social engineering attacks. . . . .

What basic knowledge do you need to learn network security?

Can solve some typical network security problems:

IP security: The main attack means are passive network eavesdropping, active IP spoofing (message forgery and tampering) and routing attack (man-in-the-middle attack);

2.DNS security: This should be familiar to everyone. Modify the mapping table of DNS to mislead users' access traffic;

3.DoS attack: Denial of service attacks launched by a single attack source mainly occupy network resources and force the target to collapse. Now, DDoS, a distributed denial of service attack initiated by multiple attack sources, is more popular.

Computer Fundamentals, Principles of Computer Organization and Computer Network are three books on computer fundamentals, which are highly recommended to you. After reading them, you can have a preliminary understanding of computer things.

1. What can I do before surfing the Internet to ensure the safety of surfing the Internet?

First, you need to install a personal firewall. With the privacy control function, you can choose which information needs to be kept secret without accidentally sending it to unsafe websites. In this way, you can also prevent the website server from tracking your email address and other personal information without your knowledge. Secondly, please install patches and updates of system and other software in time. Basically, the earlier the update, the smaller the risk. Remember to update the firewall data in time.

2. How to prevent hacker attacks?

First of all, use a personal firewall antivirus program to prevent hacker attacks and check hacker programs (software that connects to external servers and sends your information out). Personal firewall can protect your computer and personal data from hackers and prevent applications from automatically connecting to websites and sending information to them.

Secondly, turn off these functions when you don't need to enjoy files and printing. File and print are very useful functions, but this function will also expose your computer to hackers looking for security holes. Once inside your computer, hackers can steal your personal information.

3. How to prevent computer poisoning?

First of all, don't open email attachments sent by strangers, and don't open files of instant messaging software. These files may contain Trojan horses, which enable hackers to access your documents and even control your peripheral devices. You should also install an antivirus program to protect you from viruses, Trojans and worms.

4. How to ensure information security when browsing the web?

When browsing anonymously, an information store named cookie (that is, temporary file, which can save the traces of your browsing) will be generated when logging in to the website. Many websites use cookies to track your activities on the Internet.

When using the browser, you can choose the option of turning off the computer to receive cookie in the parameter options. (Open IE browser, click Tools -Inter option, select Privacy in the opened options, leave the check box of Cookies unchecked, and click OK).

5. How to ensure your information security when shopping online?

When shopping online, make sure to use a secure connection. You can determine whether the connection is secure by checking whether the lock icon in the corner of the browser window is closed. Please read the privacy policy of this website before making any transaction or sending information. Because some websites will sell your personal information to third parties. Don't disclose your personal information and password to anyone when surfing the Internet.

Levies What courses do network security engineers usually take?

Familiar with the basic knowledge of computer system; Familiar with the basic knowledge of network operating system; Understand the design and development methods of computer application system; Familiar with the basic knowledge of data communication; Familiar with the basic knowledge of system security and data security; Master the basic technology and main security protocols of network security; Master the basic principles of computer network architecture and network protocols; Master the standardization knowledge related to computer network; Master the networking technology of local area network and understand the basic technology of metropolitan area network and wide area network; Master computer network interconnection technology; Master the networking method and network application technology of TCP/IP protocol network; Understand access network and access technology; Master the basic principles and operation methods of network management; Familiar with network system performance testing and optimization technology, as well as reliability design technology; Understand the basic principles and technologies of network application; Understand the new network technology and its development trend; Understand intellectual property rights and Internet-related laws and regulations; Read and understand English materials in this field correctly.

⑽ I want a technical outline of network security.

Syllabus of Network Security Technology Course

Editor: Lin; Moderator: Cui Baocai

Applicable major: information security and related major.

Prerequisite courses: computer network and communication, network operating system, etc.

First, the course teaching objectives

"Network Security Technology" is a compulsory course in the teaching plan of "Information Security Specialty" (two-year program) in our college. Through this course, students can master the basic concepts and principles of network security technology; Basic theory and application technology of network security; Network attack and detection and firewall technology; Principles of data encryption and software encryption.

Second, the teaching content and requirements

(A) the content and requirements of theoretical teaching

1 partial network security foundation

1, security service and security mechanism

2. Network security system and evaluation criteria

3. Network security level

4. Network encryption and key management

5. Security threats

The second part is entity security technology and hardware protection technology.

1, security protection

2. Safety management

3. Hardware protection

4. Electromagnetic protection

Part 3 Software Security

1, file encryption

2. Anti-tracking technology

3, to prevent illegal copying technology

4. Software security system

The fourth part is network security protection technology

1, security service and security mechanism

2, safety protection measures

Part 5 Backup Technology

1. Prepare the design proposal.

2, backup technology and methods

Part 6 Encryption and Compression Technology

1, encryption method

2. Decryption method of keys and passwords

3. Data compression

Part 7 Database System Security

1, database system security overview

2. Data protection of database

3. Backup and recovery of database

4. Common methods of attacking database system

Part VIII Virus and its Prevention and Control

1, virus overview

2. The virus under 2.DOS

3. Macro virus

4, network computer virus and its prevention and control

5. Anti-virus technology

6. Anti-virus technology

Part 9 Firewall Technology

1, the basic concept of firewall

2 firewall technology

3. Firewall architecture and its application.

4. Types of firewalls

5. Virtual private network

10 partial network sites and system platforms

1, WINDOWS NT system security

2. Security of 2.UNIX system

3. Website security

4. Anti-hacking technology

(B) the content and requirements of experimental teaching

Experiment 1 Analyze TCP/IP with Sniffer tool.

Lab 2 Configuring Windows 2000 File System Security

Lab 3 Configuring linux File System Security

Lab 4 Windows account security

Experiment 5 Configure tel server and ssh server under linux.

Experiment 6 Security of NFS and NIS

Experiment 7 virus code characteristics analysis

Application and deployment of anti-virus software in Experiment 8

Experiment 9 Comprehensive exercise

Third, teaching arrangements and methods

This course is teaching-oriented, combined with the teaching content to carry out corresponding experiments, so that students can master the basic concepts and methods of network security and solve the security problems in the network.

Total class hours: 54 lecture class hours: 36 experimental class hours: 18

See the table below for specific arrangements:

Subtotal of serial number content face-to-face teaching experiment hours

Overview of network security 4 2

Physical security technology and hardware protection technology II

Three Software Security 2 2

Network security protection technology 4 2

Five backup technologies 4 2

Encryption and compression technology 6 4

Seven database system security 4 2

Eight viruses and their prevention and control 4 2

Nine firewall technology 2 2

Ten websites and system platforms 2

Q&A Test 2

Total 36 18

Fourth, the evaluation method.

Closed book and written test.

Verb (abbreviation of verb) recommended textbook

1, Computer Network Security Technology Cai Lijun China Water Conservancy and Hydropower Press