|
Dec 18, 2024
|
|
|
|
CST 260 - Enterprise Networking, Security, and AutomationCredits: 3 Instructional Contact Hours: 3
Introduces the architecture, components, operations, and security to scale large, complex networks, including wide area network (WAN) technologies. Emphasizes network security concepts, network virtualization, and automation.
Prerequisite(s): CST 164 with a minimum grade of “C” Corequisite(s): None Lecture Hours: 15 Lab Hours: 30 Meets MTA Requirement: None Pass/NoCredit: Yes
Outcomes and Objectives
- Configure routers and switches using OSPF.
- Describe how OSPF finds the fastest available path.
- Explain how OSPF routers complete a generic link-state routing process to reach a state of convergence.
- Configure and verify a small network for OSPFv2.
- Mitigate threats and enhance network security.
- Describe Network Security Best Practices to include: Confidentiality, Integrity, and Availability.
- Describe the Defense in Depth Approach.
- Explain the different types of firewalls.
- Differentiate between an IDP and an IPS.
- Explain the Content Security Appliance.
- Describe the use of ACLs.
- Demonstrate critical thinking skills using real equipment and Cisco Packet Tracer.
- Troubleshoot various Network Security Concepts
- Describe the causes of Network Breaches and how to mitigate them
- Discuss troubleshooting Cloud Computing and Virtualization
- Describe the process of Packet Filtering and the two types of ACLs
- Demonstrate understanding of network virtualization technologies.
- Explain the benefits of Cloud Computing and Virtualization
- Describe the two major network architectures that support network virtualization
- Demonstrate an understanding between a Traditional Architecture and a SDN Architecture.
Add to Portfolio (opens a new window)
|
|