Course Description
This course provides a comprehensive overview of cybersecurity control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement.
Security Architecture and Design Dec 2025Security Architecture and Design
Perimeter Security Fundamentals
Packet Filtering
Stateful Firewalls
Proxy Firewalls
Security Policy
Part Two: Extending the PerimeterThe Role of a RouterNetwork Intrusion DetectionVirtual Private NetworksHost HardeningHost Defense Components
The Role of a Router
Network Intrusion Detection
Virtual Private Networks
Host Hardening
Host Defense Components
Part Three: Perimeter DesignDesign FundamentalsSeparating ResourcesSoftware ArchitectureVPN IntegrationTuning the Design for PerformanceSample Designs
Design Fundamentals
Separating Resources
Software Architecture
VPN Integration
Tuning the Design for Performance
Sample Designs
Part Four: Perimeter AssessmentMaintaining a Security PerimeterNetwork Log AnalysisTroubleshooting Defense ComponentsAssessment TechniquesDesign Under FireImportance of Defense in Depth
Maintaining a Security Perimeter
Network Log Analysis
Troubleshooting Defense Components
Assessment Techniques
Design Under Fire
Importance of Defense in Depth
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details