Skip to main content

Apply now! Spring priority deadline is October 1.

CYBR 362 Networking Protocols and Analysis

Networks are the foundation of modern IT operations and play a critical role in cybersecurity, defense, and threat mitigation. As cybersecurity professionals, understanding network operations, protocols, secure network architectures, and network management is essential for protecting enterprise environments. This course provides an in-depth analysis of networking protocols, including TCP, UDP, ICMP, and IP, and explores network design, security controls, intrusion detection, automation, and troubleshooting techniques. Students will gain hands-on experience using industry-standard networking tools and security solutions. This course aligns with the CompTIA Network+ certification objectives, preparing students for real-world network security and operations challenges.

Prerequisites

Special information

First day attendance is mandatory.
Formerly: ICS 383. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits

Effective May 6, 2020 to present

Learning outcomes

General

  • Analyze network traffic patterns and packet captures to identify trends, establish baselines, and detect anomalies using network monitoring tools.
  • Evaluate and apply networking protocols, including TCP, UDP, ICMP, and IP, to secure and optimize network performance.
  • Implement network hardening techniques and security best practices to protect devices, protocols, and network infrastructures against cyber threats.
  • Design and evaluate secure network architectures, integrating routing, switching, automation, and security controls to enhance network performance and defense.
  • Configure, manage, and troubleshoot network security solutions, intrusion detection/prevention systems (IDS/IPS), and network performance metrics using industry-standard tools.
  • Document and present networking concepts, security threats, and remediation strategies effectively for technical and non-technical stakeholders.
  • Demonstrate and justify ethical decision-making in network security operations, ensuring compliance with legal, regulatory, and professional standards.

Spring 2025

Section Title Instructor books eservices
50 Networking Protocols and Analysis Tandon, Rohit Books for CYBR-362-50 Spring 2025 Course details for CYBR-362-50 Spring 2025
51 Networking Protocols and Analysis Martinez, Jonathan Nathaniel Books for CYBR-362-51 Spring 2025 Course details for CYBR-362-51 Spring 2025

Summer 2025

Section Title Instructor books eservices
50 Networking Protocols and Analysis Tandon, Rohit Books for CYBR-362-50 Summer 2025 Course details for CYBR-362-50 Summer 2025

Fall 2025

Section Title Instructor books eservices
01 Networking Protocols and Analysis Mandal, Sayonnha Books for CYBR-362-01 Fall 2025 Course details for CYBR-362-01 Fall 2025
50 Networking Protocols and Analysis Mandal, Sayonnha Books for CYBR-362-50 Fall 2025 Course details for CYBR-362-50 Fall 2025