This course will focus on Transport & Security Protocols. It will provide a study on network vulnerabilities from the perspective of analyzing network makeup and selecting the hardware and software used to secure the network. A majority of modern day networks incorporate intermediary devices (routers and switches). By focusing on their protocols as well as hardware and software vulnerabilities this course assists students with visualizing vulnerabilities and identifying areas that can be compromised. This is a necessary foundation for further investigations and the testing of remedial actions covered in in the Access Controls, Hacking & Exploits and Network Monitoring & Penetration Testing courses in semester 2.