Skip to main content

ICS 383 Networking Protocols and Analysis

Networks are the backbone of information technology operations within an enterprise and are responsible for a significant portion of an organization's security posture. Cybersecurity professionals are often tasked with securing network operations and responding to network threats which demonstrates the importance to networking knowledge in the cybersecurity industry. As a cybersecurity practitioner, it is imperative that there is an understanding of network operations, protocols, and administration practices. This course focuses on developing skills and taking a deep dive into networking protocols including TCP, UDP, ICMP, and IP, network design and architecture, network administration automation, network analysis, and network protocol and design impacts on security and defense measures. Overlap: CYBR 362.


Special information

First day attendance is mandatory.Overlap: CYBR 362. Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits

Effective December 15, 2017 to August 16, 2021

Learning outcomes


  • Interpret and analyze packet captures, and perform network trending and baselining
  • Implement network protocol and device hardening practices
  • Dissect and analyze TCP, UDP, ICMP, IP and other networking protocols based on RFC¿s and real-world applicability
  • Design network architecture and design and impacts on network security and performance
  • Distinguish between the various types of networking hardware and the roles they serve in network performance and defense
  • Design network administration automation and scripting
  • Validate network device management practices: command line interfaces and graphical user interface administration techniques
  • Create and validate signatures for IDS and IPS systems
  • Plan and execute network administration and troubleshooting practices using syslog and SNMP
  • Hunt and identify network threats based on protocols, network devices, and network design