The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
    SUNY Broome Community College
  Feb 25, 2018
Website Catalog
[Add to Portfolio]

CST 104 - Remote Security Methods

This second security course builds on the material introduced in CST 103 General Security Concepts.  Detailed examinations of many different remote access methods are undertaken.  These methods include RAS (via PPP over a modem), VPN (virtual private networking), secure email and file transfers, secure web access, wireless security, and instant messaging.

Prerequisite- Corequisite
Prerequisite:  CST 103 General Security Concepts

Corequisite:  CST 208 Introduction to Networking

Credits: 3
2 Class Hours; 2 Laboratory Hours
Course Profile
Learning Outcomes of the Course:

Upon successful completion of this course the student will be able to:

1.  Describe unsecure and secure ways of doing web, email, and ftp.
2.  Describe the operation and features of a typical router.
3.  Explain the operation of a VPN tunnel, including the protocols used, and the essentials of encryption and hashing.
4.  Understand how to setup an RAS server.
5.  Understand the basics of file and directory access security.
6.  Be familiar with wireless networking and instant messaging.

[Add to Portfolio]