The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
   
Website Catalog
SUNY Broome Community College
   
 
  Jan 24, 2018
 
 
    
Website Catalog
[Add to Portfolio]

CST 203 - Security Hardware and Software


This third security course concentrates on security hardware and software.  Hardware devices include media, NICs, switches, routers, firewalls, intrusion sensors, and biometric security sensors.  Software applications include sniffers, network scanners, remote control software, OS network commands, forensic analyzers, and event analyzers.

Prerequisite- Corequisite
Prerequisite:  CST 104 Remote Security Methods

Credits: 3
Hours
2 Class Hours, 2 Laboratory Hours
Course Profile
Learning Outcomes of the Course:

Upon successful completion of this course the student will be able to:

1.  Configure a software or hardware firewall.
2.  Configure a managed switch.
3.  Capture and analyze network traffic using a sniffer.
4.  Have knowledge of the essentials of biometric authentication involving fingerprints and facial recognition.
5.  Work with JPG image files that have embedded EXIF information or stegonographic content.
6.  Have knowledge of the operation of spanning tree algorithms and fault tolerant techniques and their application to networks.
7.  Use disassemblers and debuggers to analyze malicious code.



[Add to Portfolio]