Cyber Currlculum Course Pages

University of Arkansas at Little Rock
Undergraduate level.
“NetSiC: A Virtual Lab for Networking and Network Security in the Cloud.”

The course materials described below are available via the Cyber Curriculum Library online portal - CLICK HERE TO LOGIN.

Topics and Subtopics include:

“Virtual Switching” with emphasis on basic concepts and terms for virtual switching and basic functions and components of Linux Bridge and Open vSwitch.

“OpenFlow” with emphasis on OpenFlow protocol, tables, ACL, basic concept programming of SDN, creation, maintenance, and closure of OpenFlow communication channels between the switch and controller, management of multiple switches from a single controller and vice versa, configuration of OpenFlow switch using standard OpenFlow controller and switch procedures, and exploration and program tables in OpenFlow switches.

“Overlay Networking” with emphasis on popular L2-inL3 overlay networking technologies, using ML2 plugin in OpenStack, comparison between different types of networks including local, flat, VLAN, VXLAN, and GRE networks, benefits and drawbacks of overlay networks, and creating and managing overlay networks using Neutron API.

“Security Group” with emphasis on managing, creating, deleting, listing, and updating security groups and security group rules and applying security groups to instances and ports using dashboard and Neutron CLI .

“Network Defense” with emphasis on techniques, tools, and analysis methods used in network defense, including vulnerability scanning, intrusion detection, honeypot, and traffic monitoring and analysis, host and network intrusion detection systems, Tripwire, OSSEC, Snort, Suricata, NMAP, Nessus and OpenVAS.

“Network Protocol Security” with emphasis on attacks exploiting common vulnerabilities in TCP/IP protocol suite such as TCP SYN flooding attack, TCP reset attack, TCP session hijacking attack, ARP poisoning attack, DNS poisoning attack, Heartbleed attack, SSL stripping attack, packet sniffing, and spoofing.

“Firewall and VPN” with emphasis on firewall theory, firewall rules, firewall configuration, iptables, Shoreline Firewall, filter table, NAT table, forward chain, rerouting chain, SSL VPN, and applying firewall rules to traffic entering and leaving the tenant networks attached to Neutron routers.

And “Web Security” with emphasis on root cause of vulnerabilities, possible reconnaissance and attack methods, proper defensive measures, Metasploit, ModSecurity, and common vulnerabilities in web applications such as cross-site scripting, SQL injection, and cross-site request forgery.

NCWF Categories included:

Protect and Defend (PR)

NCWF Specialty Areas included:

Name of Specialty Area (Letter Code)

NCWF KSAs included:

K0001: Knowledge of computer networking concepts and protocols, and network security methodologies.


Eight total labs, focusing on cloud networking, network protection and network defense. Each lab is self-contained, and includes lab description, instruction, background information, questions, files, and metadata for initiating and setting up the lab environment.

Join or renew a membership

Anyone, anywhere can be a member of the NCMF.


The Founders' Group spearheads the capital campaign to build the new Cyber Center for Education and Innovation - Home of the National Cryptologic Museum.


More Info »

Donate to the CCEI-NCM

Be a part of the future - help us build the Cyber Center for Education and Innovation - Home of the National Cryptologic Museum.