NETWORK SECURITY SYLLABUSx - Lake-Sumter State College

ahemcurrentΔίκτυα και Επικοινωνίες

21 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

134 εμφανίσεις


1


INSTRUCTOR:

Betti McTurk, MSIS, MS, A+ Certified, Access Data Certified

Expert

(ACE)

McTurkB@lscc.edu






COURSE ID:



CET
2660 CRN: 10548


COURSE TITLE:

Network Security

Fundamentals


COURSE DESCRIPTION:

This course is an introduction to the language and underlying
theory of computer security that covers the essential knowledge
and skills for securing systems and/or organizations. Topics
include: General Security Concepts, Communications Security,
Infrastr
ucture Security, Basics of Cryptography and
Operational/Organizational Security. CompTIA Security+
objectives are used.


DATES AND LOCATION:

Fall 2011,
Monday
-
Wednesday
:
9
:30


10:50 AM
. South Lake,

Room 2
-

347


CREDIT:



Three (3) Credit Hours


PREREQUISI
TES:

CET 1485, equivalent industry certification,

or documented
consent of instructor.


RECOMMENDED:


Flash Drive, Typing skills



READING MATERIAL:

Security + Guide to Network Security Fundamentals, Third
Edition, by Mark Ciampa
,
ISBN: 13: 978
-
1
-
4283
-
4066
-
4





2

.
OBJECTIVES:




Introduction to Security



Systems Threats and Risks



Protecting Systems



Network Vulnerabilities and Attacks



Network Defenses



Wireless Network Security



Access Control Fundamentals



Authentication



Performing Vulnerability Assessments



Conducting Security Audits



Basic Cryptography



Applying Cryptography



Business Continuity



Security Policies and Training


STUDENT LEARNING OUTCOMES:




Prepares students the CompTIA Security+ Exam and career options for those interested
in mastering security
skills



Learning about both hardware and software attacks



Learning about world virtualized environments



Learning steps of protecting systems



Secure networking through both network design and technologies



Learning about network security tools to resist attac
ker



Terminology of security



How to conduct security audits



Learning about basic Cryptography



Critical importance of keeping business processes and communications operating
normally in the face of threats and disruptions.



Learning about Security Policies
and Training

ACADEMIC INTEGRITY:



The successful functioning of the academic community demands honesty, which is the
basis of respect for both ideas and persons. In the academic community, there is an ongoing
assumption of academic integrity at all levels
. There is the expectation that work will be
independently thoughtful and responsible as to its sources of information and inspiration.
Honesty is an

appropriate consideration in other ways as well, including but not limited to the
responsible use of libr
ary resources, responsible conduct in examinations, and the responsible
use of the Internet. (See college catalog for complete statement.)



3

STUDENTS WITH DISABILITIES:
Persons with disabilities who require assistance or
special accommodations must see the

instructor and notify the Office for Students with
Disabilities (OSD) immediately. The OSD Office is located in the Student Services Department
on Leesburg Campus. A representative can be reached by calling 352
-
365
-
3574 to set up an
appointment. Additiona
l information about Lake
-
Sumter Community College's OSD Services
can be found at
www.LSCC.edu
; click on Disability Services on the “quicklinks”.


PRIVACY POLICY (FERPA):


The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part

99)
is a Federal law that protects the privacy of a student’s education records. In order for your
information to be released, a form must be signed and in your records located in the
Admissions/Registrar’s Office.



ATTENDANCE & WITHDRAWAL POLICIES:



Cl
ass attendance as well as class participation is essential if students are to receive
maximum benefit from this class. Students are expected to complete assignments by the
due dates.
Late assignments are not accepted.
If you are unable to attend class plea
se
notify me by
e
-
mail

as soon as possible.

Punctual

and regular attendance is required.
Your attendance is the part of the final grade. I gave each of you 100 points. I will take
away 10 points for each absence and 5 points for being late or leaving ea
rly. Do not ruin
your 100
-
point. Each class will start promptly as scheduled, so arrive few minutes early
to be prepared. The last day for students to withdraw without academic penalty is
October 31


EVALUATION:

Grades will be based on:




Assignments


10
points each

=

140




Labs


10 points each

=


140



Cases


10 points each=


140



4

Tests


100 points each
=


400



Attendance


100 point
=


100

TOTAL=



920


Assignments will be based on chapter review/hands
-
on questions provided as on the website.
Again, late a
ssignments/labs will not be accepted.
Assignments and due dates will be provided
as a separate document ahead of time. Take
-
home quizzes will be based on the class lecture, and
the purpose of the quizzes is to prepare you for the tests. If for any reason

you cannot submit
your assignment on time, or you cannot take the exam on a predetermined date, please let me
know earlier via email.


The final grade will be determined as follows:


A = 90
-
100; B = 80
-
89; C = 70
-
79; D = 60
-
69; F = below 60


4


ACADEMIC HONESTY:
Please refer to the LSCC policy. Students are expected to uphold
Lake
-
Sumter Community College’s standard of conduct relating to academic honesty. Students
assume full responsibility for the content and integrity of the academic work th
ey submit. The
guiding principle of academic integrity shall be that a student's submitted work, exams, quizzes,

assignments and projects must be that of the student's own work. Students shall be guilty of
violating the honor code when and if they:




Repre
sent the work of others as their own



Use or obtain unauthorized assistance in any academic work



Give unauthorized assistance to other students



Use another student’s documents without permission


Any student violating the honor code is subject to receiving
an "F" grade for the course and will
be reported to the Office of Student Affairs. If a student is unclear about whether a particular
situation may constitute an honor code violation, the student should meet with the instructor
prior to beginning the assi
gnment to discuss the situation.


CLASSROOM COURTESY:
Some of the things that will not be tolerated in class are:




Use of a cell phone for other than an emergency in the classroom.



Using any electronic devices during the test is prohibited.



Excessive
use of the Internet for other than classroom activities



Chronic tardiness



Disruptive behavior


Any students that persist in behavior deemed inappropriate by the instructor after being warned
will be reported to the Office of Student Services.


VIOLANCE STA
TEMENT:


Lake
-
Sumter Community College has a policy of zero tolerance for violence as stated in College
Board Rule 2.17. Appropriate disciplinary action will be taken in accordance with Board Rule
2.17.


SYLLABUS DISCLAIMER:


Information contained in
this syllabus is, to the best knowledge of this instructor, considered
correct and complete when distributed to the student. The instructor reserves the right, acting
within policies and procedures of Lake
-
Sumter Community College, to make necessary change
s
in course content or instructional techniques without prior notice or obligation to the student.




5

FIRST DAY

OF THE CLASS

IS THE MOST IMPORTANT DAY OF THE CLASS. I
EXPECT MY STUDENTS TO SHOW UP ON TIME
.






WEEK

DATES

CHAPTER


TOPIC

COMMENTS

1

08/2
2
-
24

Introduction of the course, expectation,
discussions, introduction
to Security, Ch.1

First Day of the class

2

08/
29
-
31

Ch. 2, Systems Threats and Risks


3

09/
5
-
7

Ch.
3, Protecting Systems

No school Sept. 5
Labor day

4

09/12
-
14

Ch.
4, Network Vulnerabilities and Attacks

Exam 1, Chs. 1, 2, 3

5

09/
19
-
21

Ch
. 5 Network Defenses


6

09/26
-
28

Ch. 6
Wireless Network Security


7

10/3
-
5

Ch. 7
Access Control Fundamentals


8

10/10
-
12

Ch. 8
Authentication

Exam 2,
. Ch
s
4,

5,

6

9

10/17
-
19

Ch.
9. Performing vulnerability Assessments


10

10/24
-
26

Ch.
10. Conducting Security Audits


11

1
0/31
-
2

Ch.
11. Basic Cryptography


12

11/7
-
9

Ch.
12. Applying Cryptography


13

11/14
-
16

Ch.
13. Business Continuity

Exam 3, Chs 7, 8, 9
,
10

14

11/21
-
23

Ch.
14. Security Policies and Training


15

11/28
-
30

Exam Review

Floating Day

16

12/5
-
7

FINALS

Exam 4, 11, 12, 13,
14.




6




WEEKS

DUE DATES

ASSIGNMENT INFO.

1

08/2
2
-
24

Show up on August 2
2 on time. 9
:30
A
M Sharp!

Discussion of
syllabus, expectations, talking about security.

Ch. 1
. Pg. 26
-
29 Review Questions.

Hands
-
on Project, Project 1
-
3, Pg. 33 (Home).

Pg. 31. Project 1
-
2 (in class)

Case Projects (groups): Pg. 35 Case Project 1
-
1: The Current State of
Security.

Case Projects: Pg. 36. 1
-
4. : Security + Certification Jobs

2

08/
29
-
31

Ch. 2, Pg. 67
-
69, Review Questions.

Hands
-
on Project, Project 2
-
2

Case Projects (groups) Pg. 77, Case
Project 2
-
2 Reducing Spam

Case Projects (groups) Pg. 77, Case Project 2
-
3 Cell Phone attacks


3

09/
5
-
7

Ch. 3 Review Questions, Pg. 107
-
110

Hands
-
on Projects, Pg. 110
-
111, 3
-
1: Configure Data Execution
Prevention (DEP)

Hands
-
on project, Pg. 111
-
113, 3
-
2:
Test AV Software

4

*
09/12
-
14

Ch. 4 Review Questions, Pg. 145
-
148.

Hands
-
on Projects, Pg. 148
-
149; 4
-
1

Project, Pg. 150, 4
-
3

Exam 1


5

09/
19
-
21

Ch. 5 Review Questions, Pg. 177
-
180

Case

Projects:
5
-
2: Honeypots and Ethics.
Pg.
186

6

09/26
-
28

Ch. 6,
Review Questions, Pg. 216
-
219

Hands
-
on Project, Pg. 6
-
3: Spoof a MAC Address Using SMAC

7

10/3
-
5

Ch. 7, Review Questions, Pg. 253
-
355

Hands
-
on Project: 7
-
1: Use Rainbow Tables

8

*
10/10
-
12

Ch. 8, Review Questions, Pg. 291
-
294

Hands
-
on Project: 8
-
2: Create

a CardSpace Personal Card

Using MS
Windows Vista or;

Hands
-
on Project: 8
-
4 and 8
-
5: Create an OpenID Account


Use an
OpenID Account

Exam 2

9

10/17
-
19

Ch. 9, Review Questions, Pg. 324
-
327

Hands
-
on Project: 9
-
1: Using an Internet Port Scanner (GroupA)

Hands
-
on Project: 9
-
2: Using the Nessus Vulnerability Scanner
(GroupB)

10

10/24
-
26

Ch. 10
, Review Questions, Pg. 352
-
355.

Hands
-
on Project: 10
-
4: Using Behavior
-
Based Monitoring Tools


7

11

1
0/31
-
2

Ch. 11, Review Questions, Pg. 391
-
394

Hands
-
on Project:
11
-
1: Installing Has Generators and Comparing
Hashes, Pg. 394
-
395 (Group A)

Project:11
-
2: Using Microsoft’s Encrypting File System, EFS (Group B)

12

11/7
-
9

Ch. 12, Review Questions, Pg. 430
-
433

Hands
-
on Projects: 12
-
1, 12
-
2, 12
-
3

13

*
11/14
-
16

Ch. 13,
Review Questions, Pg. 467
-
470

Hands
-
on Project: 13
-
1: Entering and Viewing Metadata, Pg. 470
-
471

Exam 3

14

11/21
-
23

Ch. 14, Review Questions, Pg. 500
-
503

Hands
-
on Projects: 14
-
1, Entering and viewing Metadata

Handson

Projects: 14
-
2, Viewing Annual Credit Report

15

11/28
-
30

Chapter 9, Case Project: 9
-
3: Teaching Password Crackers

16

*
12/5
-
7

Review the exam…

䕸慭‴⁆䥎䅌





8

MICROCOMPUTER HARDWARE


FALL 2011


STUDENT SURVEY


Purpose of the survey is to assure that we

understand the syllabus and discussed the expectations.
Also, this survey will help me get to know you as an individual, understand your expectations for
this course, and your computer knowledge level, so, I can serve you better with communication
channel
s open.


Please c
omplete and turn in by the end of the first class session.


Name
:

_______________________________________________


City
:

_________________________________________
_______


Laker Mail E
-
Mail Address
:


_____________________________


Phone
Contacts (only give me num
bers that are OK for me to call when necessary)


Home _______________________ Work ___________________________


Cell _________________________ Other ___________________________


Are you coming to class directly from work or anothe


Please indicate the courses you have taken on Microcomputer Hardware, Operating

Systems, or Networking, and the level of personal
/work

experience
s

you have in these areas:





Please indicate your academic and professional goals
. You c
an use the back of this survey.



I have received a course syllabus and am familiar with the provisions and policies

are

contained within.


Sign: _______________________________ Date_________________________