CYBR 362 Networking Protocols and Analysis
Networks are the foundation of modern IT operations and play a critical role in cybersecurity, defense, and threat mitigation. As cybersecurity professionals, understanding network operations, protocols, secure network architectures, and network management is essential for protecting enterprise environments. This course provides an in-depth analysis of networking protocols, including TCP, UDP, ICMP, and IP, and explores network design, security controls, intrusion detection, automation, and troubleshooting techniques. Students will gain hands-on experience using industry-standard networking tools and security solutions. This course aligns with the CompTIA Network+ certification objectives, preparing students for real-world network security and operations challenges.
First day attendance is mandatory.
Formerly: ICS 383. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Prerequisites
Special information
Formerly: ICS 383. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits
Effective May 6, 2020 to present
Learning outcomes
General
- Analyze network traffic patterns and packet captures to identify trends, establish baselines, and detect anomalies using network monitoring tools.
- Evaluate and apply networking protocols, including TCP, UDP, ICMP, and IP, to secure and optimize network performance.
- Implement network hardening techniques and security best practices to protect devices, protocols, and network infrastructures against cyber threats.
- Design and evaluate secure network architectures, integrating routing, switching, automation, and security controls to enhance network performance and defense.
- Configure, manage, and troubleshoot network security solutions, intrusion detection/prevention systems (IDS/IPS), and network performance metrics using industry-standard tools.
- Document and present networking concepts, security threats, and remediation strategies effectively for technical and non-technical stakeholders.
- Demonstrate and justify ethical decision-making in network security operations, ensuring compliance with legal, regulatory, and professional standards.
Spring 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Networking Protocols and Analysis | Tandon, Rohit | Books for CYBR-362-50 Spring 2025 | Course details for CYBR-362-50 Spring 2025 |
51 | Networking Protocols and Analysis | Martinez, Jonathan Nathaniel | Books for CYBR-362-51 Spring 2025 | Course details for CYBR-362-51 Spring 2025 |
Summer 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Networking Protocols and Analysis | Tandon, Rohit | Books for CYBR-362-50 Summer 2025 | Course details for CYBR-362-50 Summer 2025 |
Fall 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
01 | Networking Protocols and Analysis | Mandal, Sayonnha | Books for CYBR-362-01 Fall 2025 | Course details for CYBR-362-01 Fall 2025 |
50 | Networking Protocols and Analysis | Mandal, Sayonnha | Books for CYBR-362-50 Fall 2025 | Course details for CYBR-362-50 Fall 2025 |