Introductory Methods of Network Analysis

Course Description

BASV/CYBV 326 provides students with a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network flayers support the upper ones. Students will use hands-on labs and exercises to investigate and analyze network fundamentals. CYBV/BASV 326 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements for networking principles.

Learning Outcomes

The student will:

  • Identify the major network components and protocols that enable communications and data transfer.
  • Define and describe the principal characteristics, functions and protocols of the Application Layer, Transport Layer, Network Layer and Link Layer.
  • Define and explain Wireless and mobile network architectures and protocols
  • Explain the principles of computer security
  • Exercise critical thinking strategies including reasoning, problem solving, analysis and evaluation by:
    • Analyzing network traffic and their protocol and services
    • Identifying and differentiating between connection and connectionless protocols
    • Enumerating network architectures through active and passive mapping and scanning
    • Using scanning techniques to determine the security posture of a network

Course Objectives

The student will:

  • Understand network traffic concepts flowing across various mediums, such as wired networks, wireless networks, and mobile networks
  • Understand how network traffic is formatted and sent across these networks
  • Understand, identify, and articulate attacks and mitigation strategies that occur against various protocols and network layers
  • Be able to identify and analyze various elements of network traffic using network sniffing tools such as Wireshark.
  • Students will conduct weekly exercises to capture, analyze, and develop a comprehensive report on their findings
  • Understand how network traffic is secured and how attackers can manipulate how protocols and network structures work to develop and execute their attacks
  • Complete a comprehensive final project that requires students to develop a network architecture, using a minimum of 20 concepts describe how a traffic request moves through the network, identify, describe, and provide mitigation techniques for four attacks that may be executed at each of the four layers of the TCP/IP model