VIEWS: 0 PAGES: 5 POSTED ON: 2/14/2012
Pierce College Course Syllabus COURSE TITLE: Fundamentals of Network Security ABBREVIATION: CNE 254 CREDIT HOURS: 5 Meeting time: MW, 5:30-7:40 pm Location: CTR C172 INSTRUCTOR: Vicki Romero How to contact me Please contact me is via Angel email. REQUIRED TEXT AND MATERIALS: CompTIA Security+ Deluxe Study Guide: SY0-201, Emmett Dulaney, Sybex, ISBN: 13: 978-0-470-37296-8 E-book included USB drive (at least 1GB recommended) Angel Learning at http://angel.pcd.edu/ COURSE Description: CIS 134 : Microcomputer Operating Systems ourse tea This course teaches students, through lectures, discussions, scenarios, demonstrations, chapter review questions, textbook exercises, and classroom labs, the knowledge necessary to understand core concepts of computer security. The course takes the student through key concepts of understanding threats to a computing infrastructure, securing a network infrastructure, understanding encryption technologies, securing communications and applications, and responding to incidents. The course was developed for students who want to learn how to create and maintain a secure network infrastructure. This course prepares students to take the Security+ Certification exam administered by the Computing Technology Industry Association (CompTIA). Course Objectives: By the end of the quarter, the student will be able to: 1. Describe the components of risk assessment. Identify common threats to a computing infrastructure. Describe common types of attacks and malicious code. List common defenses against threats. Apply basic security guidelines. Explain the role of security baselines. Establish a security baseline. Monitor and maintain a security baseline. Identify access control methods. Identify authentication methods. Choose authentication and access control strategies. Describe basic principles and uses of cryptography. Explain the uses of symmetric encryption. Explain the uses of hash functions. Explain the uses of public key encryption. Describe how cryptography is applied. Explain what certificates are and how they are used. Describe how a public key infrastructure distributes cryptographic keys. Describe the certificate life cycle. Explain how trust models allow a public key infrastructure to function. Describe practical applications of a public key infrastructure (PKI). Describe how features of TCP/IP relate to network security. Explain vulnerabilities that occur at various TCP/IP layers. Describe security for network cabling. Describe security for network connectivity devices. Describe procedures for detecting intrusion attempts. Respond to security incidents. Explain how to secure remote connections. Describe how to secure wireless communications. Describe how to use IP Security (IPSec) to secure network communications. Identify common attacks against Web servers and explain how to protect against them. Identify common attacks against Web browsers and explain how to protect against them Identify common attacks against DNS and explain how to protect against them. Identify common attacks against DHCP and explain how to protect against them. Explain basic concepts of Internet messaging. Describe how to secure mail servers. Describe how to secure mail clients. Describe how to secure instant messaging (IM). Establish secure topologies. Secure network perimeters. Implement firewalls. Identify steps for establishing site security. Secure removable media. Secure mobile devices. Securely dispose of equipment. Identify methods for protecting business continuity. Maintain documentation, policies, and procedures. Assess risks. Establish security education. ACADEMIC HONESTY: If you use another person’s ideas, words, music, artwork, computations, models, etc., in such a manner as to imply that the thing used was your own; or if you use notes, tests or memory aids during tests when such use was not expressly authorized; or if you steal or knowingly use test master copies to gain information prior to an examination date; or knowingly allow another person to use your work as if it were that other person’s work; or otherwise act in such a manner as to gain for yourself or another an unfair advantage over other students, you will face disciplinary actions. Cheating and plagiarism will not be tolerated and will put you in danger of failing the course. All work must be your own. CLASS PARTICIPATION: It is the student’s responsibility to actively participate in the course, and be responsible for all material described in the syllabus. If you are going to drop this course, you must formally withdraw. If you just stop doing coursework, you will receive a failing grade on your permanent record. You will not be given an Incomplete as a grade…so, don’t ask. SKILL ASSESSMENT: 9 Quizes at 100 points each (Total 900 pts) There will be unit exams due at the end of each chapter. Exams will be taken online with the blackboard system. You will get instant feedback when completed on your score. 9 Sets of Lab Activities at 100 points each (Total 900 pts) Lab activities will be assigned. You will complete every lab and turn in a short lab report for each chapter. The lab activities are due on the due date listed on the attached schedule. The lab activities are due on the due date listed on the attached schedule. ALL OF THE DUE DATES ARE TENTATIVE, SO REFER TO THE ANGEL LEARNING SITE FOR THE MOST RECENT UPDATE ON THE DUE DATES. Final Exam at 400 points The final exams will take two hours to complete. The final exam may not be retaken. The final exam will test the student’s comprehension of the material from the books, as well as any additional material that is presented in the lectures. UserName: Your username for the departmental Web Server consists of the first letter of your first name followed by your last name. Your password consists of your first name, first letter uppercase all other letters lowercase, followed by the last four digits of your student ID number. For example for William Smith with a SID of 123-45-6789: Username: wsmith (not case sensitive) Password: William6789 (case sensitive) COURSE SCHEDULE: (subject to change) Week starting Activity Assignment Week 1 Chapter 1. General Security Concepts Lab 1.1 Update a Linux System Mon Mar 28 Understanding Information Security Lab 1.2 Update a Windows System Understanding the Goals of Information Security Comprehending the Security Process Authentication Issues to Consider Wed Mar 30 Distinguishing between Security Topologies Week 2 Chapter 2. Identifying Potential Risks Lab 2.1 Identify Running Processes on a Wind Mon Apr 4 Calculating Attack Strategies Lab 2.2 Identify Running Processes on a Linux Recognizing Common Attacks Identifying TCP/IP Security Concerns Understanding Software Exploitation Wed Apr 6 Understanding OVAL Lab B.2 Turn on the Firewall in Windows XP: M Surviving Malicious Code Lab B.3 Turn on the Firewall in Windows XP: M Understanding Social Engineering Lab B.4 Create a Baseline for Internet Access Introducing Auditing Processes and Files Lab B.5 Turn on a Screensaver Password for W Week 3 Chapter 3. Infrastructure and Connectivity Lab 3.1 Examine the Windows Routing Table Mon Apr 11 Understanding Infrastructure Security Lab 3.2 Examine the Linux Routing Table Understanding the Different Network Infrastructure Devices Monitoring and Diagnosing Networks Securing Workstations and Servers Understanding Mobile Devices Wed Apr 13 Understanding Remote Access Lab B.6 Look for Security Events within Windo Securing Internet Connections Lab B.7 Identify User Accounts with Administ Understanding Network Protocols Windows XP The Basics of Cabling, Wires, and Communications Lab B.8 Turn on a Screensaver Password for o Employing Removable Storage Lab B.9 Change a Password in Linux Lab B.10 Find SUID and SGID Files in Linux Week 4 Chapter 4. Monitoring Activity and Intrusion Submit Quizzes 1 – 3 Mon Apr 18 Detection Lab 4.1 View the Active TCP and UDP Ports Monitoring the Network Lab 4.2 Run Windows Network Monitor Week starting Activity Assignment Understanding Intrusion Detection Systems Lab 4.3 Install snort in Linux Working with Wireless Systems Lab 4.4 Make File Extensions Visible in Windo Lab 4.5 Monitor Network Traffic in Linux Wed Apr 20 Understanding Instant Messaging’s Features Lab B.11 Change ACLs on All Files in a Linux D Working with 8.3 File Naming Lab B.12 Change Permissions on All Files in a Understanding Protocol Analyzers Lab B.13 Change the Default Permissions for A Understanding Signal Analysis and Intelligence Files in Linux Lab B.14 View all Linux Logins Lab B.15 Change the Group Associated with F Week 5 Chapter 5. Implementing and Maintaining a Secure Lab 5.1 Install OpenLDAP on a SuSE Server Mon Apr 25 Network Lab 5.2 Work with Performance Monitor and Overview of Network Security Threats Lab 5.3 Work with Unix/Linux Networking Defining Security Baselines Hardening the OS and NOS Hardening Network Devices Hardening Applications Wed Apr 27 Hardening NNTP Servers Lab B.16 View Failed Login Attempts Hardening File and Print Servers and Services Lab B.17 Hide a Linux File Hardening DHCP Services Lab B.18 Hide and Access a Windows Share Working with Data Repositories Lab B.19 Encrypt a Windows File Lab B.20 Count the Number of Running Linux Week 6 Chapter 6. Securing the Network and Environment Lab B.21 Display the Security Tab in Windows Mon May 2 Understanding Physical and Network Security Lab B.22 View Effective Permissions in Windo Understanding Business Continuity Planning Developing Policies, Standards, and Guidelines Wed May 4 Working with Security Standards and ISO99 Lab B.23 Turn the Guest Account Off Public Information Lab B.24 View Internet Explorer Security Setti Lab B.25 Change Internet Explorer Pop-up Blo Week 7 Chapter 7. Cryptography Basics, Methods, and Submit Quizzes 4 – 6 Mon May 9 Standards Lab 7.1 Hash Rules in Windows Server 2003 An Overview of Cryptography Lab 7.2 SSL Settings in Windows Server 2003 Understanding Cryptographic Algorithms Lab 7.3 Encrypting a File System in Linux Using Cryptographic Systems Lab 7.4 Look for Errors in IPSec Performance S Using Public Key Infrastructure Wed May 11 Preparing for Cryptographic Attacks Lab B.26 Prevent a Folder from Being Shared Understanding Cryptography Standards and Protocols Lab B.27 Enable openSUSE Firewall Understanding Key Management and the Key Life Cycle Lab B.28 Configure openSUSE Local Security Lab B.29 Set the Defaults for New Users Lab B.30 View Logged Warnings in openSUSE Week 8 Chapter 8. Security Policies and Procedures Lab 8.1 Use Automated System Recovery in W Mon May 16 Understanding Business Continuity 2003 Reinforcing Vendor Support Lab 8.2 Create a Rescue Disk in Linux Generating Policies and Procedures Lab 8.3 Create a Backup with SuSE Linux Enforcing Privilege Management Wed May 18 Lab B.31 Configure AppArmor Lab B.32 View AppArmor Reports Lab B.33 Configure openSUSE as a Kerberos C Lab B.34 Configure openSUSE as an LDAP Clie Lab B.35 Turn Off IPv6 in openSUSE Week 9 Chapter 9. Security Administration Lab 9.1 Configure Windows Automatic Updat Week starting Activity Assignment Mon May 23 Understanding Security Management Lab 9.2 Run the Microsoft Baseline Security A Simplifying Security Administration Understanding Security Awareness and Education Staying on Top of Security Regulating Privacy and Security Wed May 25 Lab B.36 Turn On Folder Encryption with ciph Lab B.37 Change the Minimum Password Age Lab B.38 Compare Your System to a Security T Lab B.39 Clear Private Data in Internet Explor Lab B.40 Clear Private Data in Firefox Week 10 No Classes, Memorial Day Mon May 30 Wed June 1 Submit Quizzes 7 – 9 Lab B.41 Configure SELinux in Fedora Lab B.42 Limit Cookies to First Party Lab B.43 Configure the Phishing Filter Lab B.44 Add a Legal Notice Lab B.45 Configure Windows XP Startup Week 11 Lab B.46 Run a Remote Desktop Mon June 6 Lab B.47 Secure the Account Database Lab B.48 Create a Restore Point Lab B.49 Return to a Restore Point Lab B.50 Boot to a Good Configuration Wed June 8 Final Exam Note: Students are expected to read each module and additional reading assignments in advance, complete assignments, module quizzes and exams in accordance with the course schedule.
Pages to are hidden for
"110CNE254B01474629253932401CNE_254_SPR10_SYLLABUS_ROMERO"Please download to view full document