Learning Center
Plans & pricing Sign in
Sign Out



  • pg 1
									                                                              Pierce College
                                                             Course Syllabus

           COURSE TITLE:     Fundamentals of Network Security
           ABBREVIATION:      CNE 254
           CREDIT HOURS:      5
           Meeting time:     MW, 5:30-7:40 pm
           Location:         CTR C172
           INSTRUCTOR:       Vicki Romero

           How to contact me
           Please contact me is via Angel email.

           CompTIA Security+ Deluxe Study Guide: SY0-201, Emmett Dulaney, Sybex, ISBN: 13: 978-0-470-37296-8
           E-book included
           USB drive (at least 1GB recommended)
           Angel Learning at
          COURSE Description:
          CIS 134 : Microcomputer Operating Systems
ourse tea This course teaches students, through lectures, discussions, scenarios, demonstrations, chapter review questions,
          textbook exercises, and classroom labs, the knowledge necessary to understand core concepts of computer security.
          The course takes the student through key concepts of understanding threats to a computing infrastructure, securing
          a network infrastructure, understanding encryption technologies, securing communications and applications, and
          responding to incidents. The course was developed for students who want to learn how to create and maintain a
          secure network infrastructure.

           This course prepares students to take the Security+ Certification exam administered by the Computing Technology
           Industry Association (CompTIA).

           Course Objectives:
           By the end of the quarter, the student will be able to:
                                  1. Describe the components of risk assessment.
                                  Identify common threats to a computing infrastructure.
                                  Describe common types of attacks and malicious code.
                                  List common defenses against threats.
                                  Apply basic security guidelines.
                                  Explain the role of security baselines.
                                  Establish a security baseline.
                                  Monitor and maintain a security baseline.
                                  Identify access control methods.
                                  Identify authentication methods.
                                  Choose authentication and access control strategies.
                                  Describe basic principles and uses of cryptography.
                                  Explain the uses of symmetric encryption.
                                  Explain the uses of hash functions.
                                  Explain the uses of public key encryption.
                                  Describe how cryptography is applied.
                                  Explain what certificates are and how they are used.
                                  Describe how a public key infrastructure distributes cryptographic keys.
                          Describe the certificate life cycle.
                          Explain how trust models allow a public key infrastructure to function.
                          Describe practical applications of a public key infrastructure (PKI).
                          Describe how features of TCP/IP relate to network security.
                          Explain vulnerabilities that occur at various TCP/IP layers.
                          Describe security for network cabling.
                          Describe security for network connectivity devices.
                          Describe procedures for detecting intrusion attempts.
                          Respond to security incidents.
                          Explain how to secure remote connections.
                          Describe how to secure wireless communications.
                          Describe how to use IP Security (IPSec) to secure network communications.
                          Identify common attacks against Web servers and explain how to protect against them.
                          Identify common attacks against Web browsers and explain how to protect against them
                          Identify common attacks against DNS and explain how to protect against them.
                          Identify common attacks against DHCP and explain how to protect against them.
                          Explain basic concepts of Internet messaging.
                          Describe how to secure mail servers.
                          Describe how to secure mail clients.
                          Describe how to secure instant messaging (IM).
                          Establish secure topologies.
                          Secure network perimeters.
                          Implement firewalls.
                          Identify steps for establishing site security.
                          Secure removable media.
                          Secure mobile devices.
                          Securely dispose of equipment.
                          Identify methods for protecting business continuity.
                          Maintain documentation, policies, and procedures.
                          Assess risks.
                          Establish security education.

If you use another person’s ideas, words, music, artwork, computations, models, etc., in such a manner as to imply
that the thing used was your own; or if you use notes, tests or memory aids during tests when such use was not
expressly authorized; or if you steal or knowingly use test master copies to gain information prior to an examination
date; or knowingly allow another person to use your work as if it were that other person’s work; or otherwise act in
such a manner as to gain for yourself or another an unfair advantage over other students, you will face disciplinary
actions. Cheating and plagiarism will not be tolerated and will put you in danger of failing the course. All work must
be your own.

It is the student’s responsibility to actively participate in the course, and be responsible for all material described in
the syllabus. If you are going to drop this course, you must formally withdraw. If you just stop doing coursework, you
will receive a failing grade on your permanent record. You will not be given an Incomplete as a grade…so, don’t ask.

9 Quizes at 100 points each (Total 900 pts)
        There will be unit exams due at the end of each chapter. Exams will be taken online with the blackboard
        system. You will get instant feedback when completed on your score.
9 Sets of Lab Activities at 100 points each (Total 900 pts)
        Lab activities will be assigned. You will complete every lab and turn in a short lab report for each chapter.
        The lab activities are due on the due date listed on the attached schedule. The lab activities are due on the
        due date listed on the attached schedule. ALL OF THE DUE DATES ARE TENTATIVE, SO REFER TO THE ANGEL
Final Exam at 400 points
The final exams will take two hours to complete. The final exam may not be retaken. The final exam will test the
student’s comprehension of the material from the books, as well as any additional material that is presented in the

Your username for the departmental Web Server consists of the first letter of your first name followed by your last
name. Your password consists of your first name, first letter uppercase all other letters lowercase, followed by the
last four digits of your student ID number. For example for William Smith with a SID of 123-45-6789:
Username: wsmith     (not case sensitive)
Password:     William6789 (case sensitive)

COURSE SCHEDULE:        (subject to change)

 Week starting                               Activity                                                     Assignment
 Week 1            Chapter 1.      General Security Concepts                     Lab 1.1 Update a Linux System
 Mon Mar 28        Understanding Information Security                            Lab 1.2 Update a Windows System
                   Understanding the Goals of Information Security
                   Comprehending the Security Process
                   Authentication Issues to Consider
 Wed Mar 30        Distinguishing between Security Topologies
 Week 2            Chapter 2.      Identifying Potential Risks                   Lab 2.1 Identify Running Processes on a Wind
 Mon Apr 4         Calculating Attack Strategies                                 Lab 2.2 Identify Running Processes on a Linux
                   Recognizing Common Attacks
                   Identifying TCP/IP Security Concerns
                   Understanding Software Exploitation
 Wed Apr 6         Understanding OVAL                                            Lab B.2 Turn on the Firewall in Windows XP: M
                   Surviving Malicious Code                                      Lab B.3 Turn on the Firewall in Windows XP: M
                   Understanding Social Engineering                              Lab B.4 Create a Baseline for Internet Access
                   Introducing Auditing Processes and Files                      Lab B.5 Turn on a Screensaver Password for W
 Week 3            Chapter 3.      Infrastructure and Connectivity               Lab 3.1 Examine the Windows Routing Table
 Mon Apr 11        Understanding Infrastructure Security                         Lab 3.2 Examine the Linux Routing Table
                   Understanding the Different Network Infrastructure
                   Monitoring and Diagnosing Networks
                   Securing Workstations and Servers
                   Understanding Mobile Devices
 Wed Apr 13        Understanding Remote Access                                   Lab B.6 Look for Security Events within Windo
                   Securing Internet Connections                                 Lab B.7 Identify User Accounts with Administ
                   Understanding Network Protocols                               Windows XP
                   The Basics of Cabling, Wires, and Communications              Lab B.8 Turn on a Screensaver Password for o
                   Employing Removable Storage                                   Lab B.9 Change a Password in Linux
                                                                                 Lab B.10 Find SUID and SGID Files in Linux
 Week 4            Chapter 4.     Monitoring Activity and Intrusion              Submit Quizzes 1 – 3
 Mon Apr 18        Detection                                                     Lab 4.1 View the Active TCP and UDP Ports
                   Monitoring the Network                                        Lab 4.2 Run Windows Network Monitor
Week starting                           Activity                                                    Assignment
                Understanding Intrusion Detection Systems               Lab 4.3 Install snort in Linux
                Working with Wireless Systems                           Lab 4.4 Make File Extensions Visible in Windo
                                                                        Lab 4.5 Monitor Network Traffic in Linux
Wed Apr 20      Understanding Instant Messaging’s Features              Lab B.11 Change ACLs on All Files in a Linux D
                Working with 8.3 File Naming                            Lab B.12 Change Permissions on All Files in a
                Understanding Protocol Analyzers                        Lab B.13 Change the Default Permissions for A
                Understanding Signal Analysis and Intelligence          Files in Linux
                                                                        Lab B.14 View all Linux Logins
                                                                        Lab B.15 Change the Group Associated with F
Week 5          Chapter 5.      Implementing and Maintaining a Secure   Lab 5.1 Install OpenLDAP on a SuSE Server
Mon Apr 25      Network                                                 Lab 5.2 Work with Performance Monitor and
                Overview of Network Security Threats                    Lab 5.3 Work with Unix/Linux Networking
                Defining Security Baselines
                Hardening the OS and NOS
                Hardening Network Devices
                Hardening Applications
Wed Apr 27      Hardening NNTP Servers                                  Lab B.16 View Failed Login Attempts
                Hardening File and Print Servers and Services           Lab B.17 Hide a Linux File
                Hardening DHCP Services                                 Lab B.18 Hide and Access a Windows Share
                Working with Data Repositories                          Lab B.19 Encrypt a Windows File
                                                                        Lab B.20 Count the Number of Running Linux
Week 6          Chapter 6.      Securing the Network and Environment    Lab B.21 Display the Security Tab in Windows
Mon May 2       Understanding Physical and Network Security             Lab B.22 View Effective Permissions in Windo
                Understanding Business Continuity Planning
                Developing Policies, Standards, and Guidelines
Wed May 4       Working with Security Standards and ISO99               Lab B.23 Turn the Guest Account Off
                Public Information                                      Lab B.24 View Internet Explorer Security Setti
                                                                        Lab B.25 Change Internet Explorer Pop-up Blo
Week 7          Chapter 7.      Cryptography Basics, Methods, and       Submit Quizzes 4 – 6
Mon May 9       Standards                                               Lab 7.1 Hash Rules in Windows Server 2003
                An Overview of Cryptography                             Lab 7.2 SSL Settings in Windows Server 2003
                Understanding Cryptographic Algorithms                  Lab 7.3 Encrypting a File System in Linux
                Using Cryptographic Systems                             Lab 7.4 Look for Errors in IPSec Performance S
                Using Public Key Infrastructure
Wed May 11      Preparing for Cryptographic Attacks                     Lab B.26 Prevent a Folder from Being Shared
                Understanding Cryptography Standards and Protocols      Lab B.27 Enable openSUSE Firewall
                Understanding Key Management and the Key Life Cycle     Lab B.28 Configure openSUSE Local Security
                                                                        Lab B.29 Set the Defaults for New Users
                                                                        Lab B.30 View Logged Warnings in openSUSE
Week 8          Chapter 8.       Security Policies and Procedures       Lab 8.1 Use Automated System Recovery in W
Mon May 16      Understanding Business Continuity                       2003
                Reinforcing Vendor Support                              Lab 8.2 Create a Rescue Disk in Linux
                Generating Policies and Procedures                      Lab 8.3 Create a Backup with SuSE Linux
                Enforcing Privilege Management
Wed May 18                                                              Lab B.31 Configure AppArmor
                                                                        Lab B.32 View AppArmor Reports
                                                                        Lab B.33 Configure openSUSE as a Kerberos C
                                                                        Lab B.34 Configure openSUSE as an LDAP Clie
                                                                        Lab B.35 Turn Off IPv6 in openSUSE
Week 9          Chapter 9.      Security Administration                 Lab 9.1 Configure Windows Automatic Updat
 Week starting                              Activity                                                  Assignment
 Mon May 23       Understanding Security Management                          Lab 9.2 Run the Microsoft Baseline Security A
                  Simplifying Security Administration
                  Understanding Security Awareness and Education
                  Staying on Top of Security
                  Regulating Privacy and Security
 Wed May 25                                                                  Lab B.36 Turn On Folder Encryption with ciph
                                                                             Lab B.37 Change the Minimum Password Age
                                                                             Lab B.38 Compare Your System to a Security T
                                                                             Lab B.39 Clear Private Data in Internet Explor
                                                                             Lab B.40 Clear Private Data in Firefox
 Week 10          No Classes, Memorial Day
 Mon May 30
 Wed June 1                                                                  Submit Quizzes 7 – 9
                                                                             Lab B.41 Configure SELinux in Fedora
                                                                             Lab B.42 Limit Cookies to First Party
                                                                             Lab B.43 Configure the Phishing Filter
                                                                             Lab B.44 Add a Legal Notice
                                                                             Lab B.45 Configure Windows XP Startup
 Week 11                                                                     Lab B.46 Run a Remote Desktop
 Mon June 6                                                                  Lab B.47 Secure the Account Database
                                                                             Lab B.48 Create a Restore Point
                                                                             Lab B.49 Return to a Restore Point
                                                                             Lab B.50 Boot to a Good Configuration
 Wed June 8        Final Exam
Note: Students are expected to read each module and additional reading assignments in advance, complete
assignments, module quizzes and exams in accordance with the course schedule.

To top