โ† Back to Michael Kapfer

George Mason University  ยท  School of Computing

Currently Teaching

IT 366 โ€” Introduction to
Network Security

IT 366 introduces the fundamental concepts and techniques behind securing networked systems. Students gain both theoretical understanding and hands-on familiarity with the cryptographic tools that underpin modern cybersecurity โ€” from symmetric encryption to public-key infrastructure and digital signatures.

The course is built around the premise that you cannot defend what you do not understand. Before students can secure a network, they must understand how attackers think, how cryptographic primitives work, and how the classic triad of security services โ€” confidentiality, integrity, and availability โ€” applies to every design decision.

C
Confidentiality
Ensuring information is accessible only to those authorized to see it
I
Integrity
Guaranteeing data has not been altered or tampered with
A
Availability
Making sure systems and data are accessible when needed
๐Ÿ”‘
Symmetric Encryption
AES, DES โ€” one key for both encrypt & decrypt
๐Ÿ—๏ธ
Asymmetric Encryption
RSA, ECC โ€” public/private key pairs
#๏ธโƒฃ
Hashing
SHA-256, MD5 โ€” one-way integrity verification
โœ๏ธ
Digital Signatures
Authentication, non-repudiation & integrity

My background in cryptography dates to my years as an application developer and architect at IBM, where I worked directly on cryptographic systems. I later applied that foundation across two decades of cybersecurity leadership โ€” at the Federal Government, and as CIO/CISO at Northwest Federal Credit Union. In IT 366, students get exposure to the same concepts I've used throughout my career to protect some of the most sensitive systems in the country.