Contact Admissions: (866) 967-7046

email: onlineprograms@lewisu.edu

Computer science students in a meeting

CPSC-68000 Industrial and Critical Infrastructure Network Security

Credits: 
3
Prerequisites: 
CPSC-50600 and networking experience

The critical infrastructures of a nation are those systems that provide the goods, resources and services essential to modern life. These include utility systems like power, water and natural gas delivery systems, as well as transportation networks, banking and finance and emergency services. Historically, these infrastructures have been kept physically and logically separated from other networks and systems. They also have tended to use the same networking protocols as industrial and manufacturing control systems. However, the trend toward convergence and its promised efficiencies have introduced new vulnerabilities to both industrial and critical infrastructure systems. This course describes critical infrastructures and industrial control systems are supported by computer technology, identifies and explains in technical detail the vulnerabilities that affect this technology and explain how to design solutions to counteract these vulnerabilities.

Learning Objectives:

  1. Define defense in depth and implement it within a Critical Infrastructure.
  2. Explain key terms within a Critical Infrastructure: Supervisory Control and Data Acquisition, Industrial Controls Systems, Distributed Control Systems, and Process Control Systems.
  3. Determine the best firewall structure to use for a given network.
  4. Define what traffic is allowed into the network.
  5. Define what traffic is allowed to leave the network.
  6. Create firewall rules that are necessary to block unwanted network traffic from a specified host or port.
  7. Define the protocols used within a Critical Infrastructure.
  8. Implement a combination of topologies used within a Critical Infrastructure.
  9. List and explain the techniques that are used to attack a Critical Infrastructure.
  10. Determine the threats and vulnerabilities within the Critical Infrastructure.
  11. Implement a defense in depth strategy in a security zone.
  12. Determine the best practices in creating firewall rule sets within a Critical Infrastructure.
  13. Implement IDS rule sets within the network.
  14. Understand what a SIEM is.
  15. Determine what needs to be logged, for how long, and how to protect it.

YOUR OPPORTUNITY: You will learn how to design mission-critical data communication networks that can support the operation of critical infrastructures, such as energy delivery and financial systems.

Take the Next Step

Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.