COURSE TITLE: Fundamentals of Network Security
ABBREVIATION: CNE 254
CREDIT HOURS: 5
Meeting time: MW, 5:30-7:40 pm
Location: CTR C172
INSTRUCTOR: Vicki Romero
How to contact me
Please contact me is via Angel email.
REQUIRED TEXT AND MATERIALS:
CompTIA Security+ Deluxe Study Guide: SY0-201, Emmett Dulaney, Sybex, ISBN: 13: 978-0-470-37296-8
USB drive (at least 1GB recommended)
Angel Learning at http://angel.pcd.edu/
CIS 134 : Microcomputer Operating Systems
ourse tea This course teaches students, through lectures, discussions, scenarios, demonstrations, chapter review questions,
textbook exercises, and classroom labs, the knowledge necessary to understand core concepts of computer security.
The course takes the student through key concepts of understanding threats to a computing infrastructure, securing
a network infrastructure, understanding encryption technologies, securing communications and applications, and
responding to incidents. The course was developed for students who want to learn how to create and maintain a
secure network infrastructure.
This course prepares students to take the Security+ Certification exam administered by the Computing Technology
Industry Association (CompTIA).
By the end of the quarter, the student will be able to:
1. Describe the components of risk assessment.
Identify common threats to a computing infrastructure.
Describe common types of attacks and malicious code.
List common defenses against threats.
Apply basic security guidelines.
Explain the role of security baselines.
Establish a security baseline.
Monitor and maintain a security baseline.
Identify access control methods.
Identify authentication methods.
Choose authentication and access control strategies.
Describe basic principles and uses of cryptography.
Explain the uses of symmetric encryption.
Explain the uses of hash functions.
Explain the uses of public key encryption.
Describe how cryptography is applied.
Explain what certificates are and how they are used.
Describe how a public key infrastructure distributes cryptographic keys.
Describe the certificate life cycle.
Explain how trust models allow a public key infrastructure to function.
Describe practical applications of a public key infrastructure (PKI).
Describe how features of TCP/IP relate to network security.
Explain vulnerabilities that occur at various TCP/IP layers.
Describe security for network cabling.
Describe security for network connectivity devices.
Describe procedures for detecting intrusion attempts.
Respond to security incidents.
Explain how to secure remote connections.
Describe how to secure wireless communications.
Describe how to use IP Security (IPSec) to secure network communications.
Identify common attacks against Web servers and explain how to protect against them.
Identify common attacks against Web browsers and explain how to protect against them
Identify common attacks against DNS and explain how to protect against them.
Identify common attacks against DHCP and explain how to protect against them.
Explain basic concepts of Internet messaging.
Describe how to secure mail servers.
Describe how to secure mail clients.
Describe how to secure instant messaging (IM).
Establish secure topologies.
Secure network perimeters.
Identify steps for establishing site security.
Secure removable media.
Secure mobile devices.
Securely dispose of equipment.
Identify methods for protecting business continuity.
Maintain documentation, policies, and procedures.
Establish security education.
If you use another person’s ideas, words, music, artwork, computations, models, etc., in such a manner as to imply
that the thing used was your own; or if you use notes, tests or memory aids during tests when such use was not
expressly authorized; or if you steal or knowingly use test master copies to gain information prior to an examination
date; or knowingly allow another person to use your work as if it were that other person’s work; or otherwise act in
such a manner as to gain for yourself or another an unfair advantage over other students, you will face disciplinary
actions. Cheating and plagiarism will not be tolerated and will put you in danger of failing the course. All work must
be your own.
It is the student’s responsibility to actively participate in the course, and be responsible for all material described in
the syllabus. If you are going to drop this course, you must formally withdraw. If you just stop doing coursework, you
will receive a failing grade on your permanent record. You will not be given an Incomplete as a grade…so, don’t ask.
9 Quizes at 100 points each (Total 900 pts)
There will be unit exams due at the end of each chapter. Exams will be taken online with the blackboard
system. You will get instant feedback when completed on your score.
9 Sets of Lab Activities at 100 points each (Total 900 pts)
Lab activities will be assigned. You will complete every lab and turn in a short lab report for each chapter.
The lab activities are due on the due date listed on the attached schedule. The lab activities are due on the
due date listed on the attached schedule. ALL OF THE DUE DATES ARE TENTATIVE, SO REFER TO THE ANGEL
LEARNING SITE FOR THE MOST RECENT UPDATE ON THE DUE DATES.
Final Exam at 400 points
The final exams will take two hours to complete. The final exam may not be retaken. The final exam will test the
student’s comprehension of the material from the books, as well as any additional material that is presented in the
Your username for the departmental Web Server consists of the first letter of your first name followed by your last
name. Your password consists of your first name, first letter uppercase all other letters lowercase, followed by the
last four digits of your student ID number. For example for William Smith with a SID of 123-45-6789:
Username: wsmith (not case sensitive)
Password: William6789 (case sensitive)
COURSE SCHEDULE: (subject to change)
Week starting Activity Assignment
Week 1 Chapter 1. General Security Concepts Lab 1.1 Update a Linux System
Mon Mar 28 Understanding Information Security Lab 1.2 Update a Windows System
Understanding the Goals of Information Security
Comprehending the Security Process
Authentication Issues to Consider
Wed Mar 30 Distinguishing between Security Topologies
Week 2 Chapter 2. Identifying Potential Risks Lab 2.1 Identify Running Processes on a Wind
Mon Apr 4 Calculating Attack Strategies Lab 2.2 Identify Running Processes on a Linux
Recognizing Common Attacks
Identifying TCP/IP Security Concerns
Understanding Software Exploitation
Wed Apr 6 Understanding OVAL Lab B.2 Turn on the Firewall in Windows XP: M
Surviving Malicious Code Lab B.3 Turn on the Firewall in Windows XP: M
Understanding Social Engineering Lab B.4 Create a Baseline for Internet Access
Introducing Auditing Processes and Files Lab B.5 Turn on a Screensaver Password for W
Week 3 Chapter 3. Infrastructure and Connectivity Lab 3.1 Examine the Windows Routing Table
Mon Apr 11 Understanding Infrastructure Security Lab 3.2 Examine the Linux Routing Table
Understanding the Different Network Infrastructure
Monitoring and Diagnosing Networks
Securing Workstations and Servers
Understanding Mobile Devices
Wed Apr 13 Understanding Remote Access Lab B.6 Look for Security Events within Windo
Securing Internet Connections Lab B.7 Identify User Accounts with Administ
Understanding Network Protocols Windows XP
The Basics of Cabling, Wires, and Communications Lab B.8 Turn on a Screensaver Password for o
Employing Removable Storage Lab B.9 Change a Password in Linux
Lab B.10 Find SUID and SGID Files in Linux
Week 4 Chapter 4. Monitoring Activity and Intrusion Submit Quizzes 1 – 3
Mon Apr 18 Detection Lab 4.1 View the Active TCP and UDP Ports
Monitoring the Network Lab 4.2 Run Windows Network Monitor
Week starting Activity Assignment
Understanding Intrusion Detection Systems Lab 4.3 Install snort in Linux
Working with Wireless Systems Lab 4.4 Make File Extensions Visible in Windo
Lab 4.5 Monitor Network Traffic in Linux
Wed Apr 20 Understanding Instant Messaging’s Features Lab B.11 Change ACLs on All Files in a Linux D
Working with 8.3 File Naming Lab B.12 Change Permissions on All Files in a
Understanding Protocol Analyzers Lab B.13 Change the Default Permissions for A
Understanding Signal Analysis and Intelligence Files in Linux
Lab B.14 View all Linux Logins
Lab B.15 Change the Group Associated with F
Week 5 Chapter 5. Implementing and Maintaining a Secure Lab 5.1 Install OpenLDAP on a SuSE Server
Mon Apr 25 Network Lab 5.2 Work with Performance Monitor and
Overview of Network Security Threats Lab 5.3 Work with Unix/Linux Networking
Defining Security Baselines
Hardening the OS and NOS
Hardening Network Devices
Wed Apr 27 Hardening NNTP Servers Lab B.16 View Failed Login Attempts
Hardening File and Print Servers and Services Lab B.17 Hide a Linux File
Hardening DHCP Services Lab B.18 Hide and Access a Windows Share
Working with Data Repositories Lab B.19 Encrypt a Windows File
Lab B.20 Count the Number of Running Linux
Week 6 Chapter 6. Securing the Network and Environment Lab B.21 Display the Security Tab in Windows
Mon May 2 Understanding Physical and Network Security Lab B.22 View Effective Permissions in Windo
Understanding Business Continuity Planning
Developing Policies, Standards, and Guidelines
Wed May 4 Working with Security Standards and ISO99 Lab B.23 Turn the Guest Account Off
Public Information Lab B.24 View Internet Explorer Security Setti
Lab B.25 Change Internet Explorer Pop-up Blo
Week 7 Chapter 7. Cryptography Basics, Methods, and Submit Quizzes 4 – 6
Mon May 9 Standards Lab 7.1 Hash Rules in Windows Server 2003
An Overview of Cryptography Lab 7.2 SSL Settings in Windows Server 2003
Understanding Cryptographic Algorithms Lab 7.3 Encrypting a File System in Linux
Using Cryptographic Systems Lab 7.4 Look for Errors in IPSec Performance S
Using Public Key Infrastructure
Wed May 11 Preparing for Cryptographic Attacks Lab B.26 Prevent a Folder from Being Shared
Understanding Cryptography Standards and Protocols Lab B.27 Enable openSUSE Firewall
Understanding Key Management and the Key Life Cycle Lab B.28 Configure openSUSE Local Security
Lab B.29 Set the Defaults for New Users
Lab B.30 View Logged Warnings in openSUSE
Week 8 Chapter 8. Security Policies and Procedures Lab 8.1 Use Automated System Recovery in W
Mon May 16 Understanding Business Continuity 2003
Reinforcing Vendor Support Lab 8.2 Create a Rescue Disk in Linux
Generating Policies and Procedures Lab 8.3 Create a Backup with SuSE Linux
Enforcing Privilege Management
Wed May 18 Lab B.31 Configure AppArmor
Lab B.32 View AppArmor Reports
Lab B.33 Configure openSUSE as a Kerberos C
Lab B.34 Configure openSUSE as an LDAP Clie
Lab B.35 Turn Off IPv6 in openSUSE
Week 9 Chapter 9. Security Administration Lab 9.1 Configure Windows Automatic Updat
Week starting Activity Assignment
Mon May 23 Understanding Security Management Lab 9.2 Run the Microsoft Baseline Security A
Simplifying Security Administration
Understanding Security Awareness and Education
Staying on Top of Security
Regulating Privacy and Security
Wed May 25 Lab B.36 Turn On Folder Encryption with ciph
Lab B.37 Change the Minimum Password Age
Lab B.38 Compare Your System to a Security T
Lab B.39 Clear Private Data in Internet Explor
Lab B.40 Clear Private Data in Firefox
Week 10 No Classes, Memorial Day
Mon May 30
Wed June 1 Submit Quizzes 7 – 9
Lab B.41 Configure SELinux in Fedora
Lab B.42 Limit Cookies to First Party
Lab B.43 Configure the Phishing Filter
Lab B.44 Add a Legal Notice
Lab B.45 Configure Windows XP Startup
Week 11 Lab B.46 Run a Remote Desktop
Mon June 6 Lab B.47 Secure the Account Database
Lab B.48 Create a Restore Point
Lab B.49 Return to a Restore Point
Lab B.50 Boot to a Good Configuration
Wed June 8 Final Exam
Note: Students are expected to read each module and additional reading assignments in advance, complete
assignments, module quizzes and exams in accordance with the course schedule.