CNT-260: Network Security

Business, Entrepreneurship, and Professional Development
Computer Technology
CISCO Academy
Academic Level
Course Subject
Computer Networking - CISCO
Course Number
Course Title
Network Security
Credit Hours
Instructor Contact Hours Per Semester
62.00 (for 15-week classes)
Student Contact Hours Per Semester
62.00 (for 15-week classes)
Grading Method
CNT-120 or CIS-112; or Instructor Permission
Catalog Course Description

Introduces network security. Emphasizes security terminology and concepts, network security design, security threats and vulnerabilities, security assessment tools and techniques, application, host, and data security, access control concepts and implementation, risk management and business continuity, and basic cryptography through laboratory exercises and detailed lectures. Course topics typically help students prepare for the CompTIA Security+ certification exam. NOTE: This exam is not included in this course. Industry certification exams are administered by an independent testing agency.

Goals, Topics, and Objectives

Core Course Topics
  1. Network Security Terminology and Concepts
  2. Network Security Design and Implementation
  3. Risk Management and Business Continuity
  4. Network Security Threats and Vulnerabilities
  5. Security Assessment Tools and Techniques
  6. Application, Host, Data, and Wireless Security
  7. Access Control Concepts and Implementation
  8. Basic and Advanced Cryptography
  9. Malware and Social Engineering
  10. Application and Network Attacks
  11. Vulnerability Assessment and Mitigating Attacks
Core Course Learning Objectives (Separated)
  • Describe basic network security terminology and concepts.
  • Explain the security function of various network devices and technologies.
  • Distinguish and differentiate between network design elements.
  • Explain the security concerns associated with basic networking devices, network media, security topologies and systems.
  • Explain the security implications of physical security, risk management, disaster recovery, business continuity, and security policies and procedures.
  • Analyze and differentiate among different types of network attacks.
  • Assess various tools and techniques used to discover security threats and vulnerabilities.
  • Plan the appropriate actions to mitigate vulnerability and risk.
  • Explain the importance of application, host, and data security.
  • Differentiate between and explain best practices of authentication, authorization, and access control.
  • Implement security control best practices related to account management.
  • Explain general cryptography terminology and concepts.
  • Apply appropriate cryptographic tools.
  • Explain the concept of public key infrastructure (PKI).
  • Implement PKI.

Assessment and Requirements

Assessment of Academic Achievement

Students will be assessed based on lab work, multiple-choice and essay type chapter tests, a midterm, and a final exam.


Satisfies Wellness Requirement
Effective Term
Fall 2024