Skip to main content

CYBR 362 Networking Protocols and Analysis

Networks are the backbone of information technology operations within an enterprise and are responsible for a significant portion of an organization's security posture. Cybersecurity professionals are often tasked with securing network operations and responding to network threats which demonstrates the importance to networking knowledge in the cybersecurity industry. As a cybersecurity practitioner, it is imperative that there is an understanding of network operations, protocols, and administration practices. This course focuses on developing skills and taking a deep dive into networking protocols including TCP, UDP, ICMP, and IP, network design and architecture, network administration automation, network analysis, and network protocol and design impacts on security and defense measures. Overlap: ICS 383 Networking Protocols and Analysis


Special information

First day attendance is mandatory.Formerly: ICS 383. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits

Effective May 6, 2020 to present

Learning outcomes


  • Interpret and analyze packet captures, and perform network trending and baselining
  • Implement network protocol and device hardening practices
  • Dissect and analyze TCP, UDP, ICMP, IP and other networking protocols based on RFC¿s and real-world applicability
  • Design network architecture and design and impacts on network security and performance
  • Distinguish between the various types of networking hardware and the roles they serve in network performance and defense
  • Design network administration automation and scripting
  • Validate network device management practices: command line interfaces and graphical user interface administration techniques
  • Create and validate signatures for IDS and IPS systems
  • Plan and execute network administration and troubleshooting practices using syslog and SNMP
  • Hunt and identify network threats based on protocols, network devices, and network design

Fall 2021

Section Title Instructor
01 Networking Protocols and Analysis Tandon, Rohit Books Course details
50 Networking Protocols and Analysis Rabieh, Khaled Books Course details