DA 200 Computer and Network Security Course Outline

smileybloatΔίκτυα και Επικοινωνίες

20 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

59 εμφανίσεις

Course Outline

A. Course Number and Title:


Computer and Network Security

requisite: DA 1
07 Introduction to Information
Systems Security

B. Curriculum:

Information Technology (1492), Technical elective

C. Course Description:

This c
ourse provides an overview of the setup and use of
firewalls. Securing e
mail servers will be discussed. Also,
approaches for detecting and responding to buffer attacks will be
discussed and demonstrated. Viruses, operating systems security
holes, along wi
th impersonation, spoofing and wireless security
flaws will be discussed.

D. Duration of Instructional Period:

150 minutes/week/15 weeks


100 minutes/week/15 weeks


3,750 minutes/semester (4) credit hour

E. Lecture/Lab/Credit Hours:


F. Suggested Text(s):

Guide to Network
Defense & Countermeasures

Randy Weaver

Thomson, Course Technology, Copyright 2006


G. Course Outcomes:

Upon completion, the student will be able to:

1. Describe and understand what a firewall is

2. Describe intrusion detection software and what it is used for

3. Identify various encryption/decryption co

4. Discuss various methodologies relating to e
mail security

5. Analyze network security with regard to firewalls, tripwires,

intrusion detection

6. Have an understanding of approaches for detection and

responding to buf
fer attacks

7. Have a working knowledge of operating system security

holes and all application vulnerabilities

8. Identify and correct wireless security flaws

H. Program Competencies:

1. Demonstrate knowledge of a broad business and rea
l world
perspectives of information technology

2. Demonstrate analytical and critical thinking skills

3. Demonstrate the ability to apply analytical and logical
thinking to gathering and analyzing information, designing and
testing soluti
ons to problems and formulating plans

4. Demonstrate the ability to visualize and articulate complex
problems and concepts

5. Use and apply current technical concepts and practices in the
core information technologies

6. Design effective and usable IT
based solutions and integrate
those components into the user environment

7. Identify and evaluate current and emerging technologies and
assess their applicability to address the users’ needs

8. Demonstrate an understanding of best practices, standards and
their application

9. Demonstrate independent critical thinking and problem
solving skills

10. Communicate effectively and efficiently with clients, users
and peers both verbally and in writing, using appropriate

I. SUNY General Education Knowledge and Skills:


J. ECC Graduate Learning Outcomes (GLO):

1. To identify and logically analyze problems and issues and to

propose a
nd evaluate solutions (Related Course Objectives 4,5)

2.To apply appropriate mathematical procedures and quantitative

methods (Related Course Objectives 1

3. To read critically (Related Course Objectives 1

4. To operate a co
mputer (Related Course Objectives 1

K. Assessment of Student Learning
: Six (6) laboratory exercises @ 30 pts each


(participative & written)

Midterm Exam


Final Exam


Total Possible Points


L. Library Resources:

Students are encouraged to use the resources of the computer
labs on campus. Library resources should also be used.

Pfleeger, C. and Pfleeger, S.L. (2002).
Security in Computing
Upper Saddle River, New Jersey: Pearson Edu

Stallings, W. (2003).
Network Security Essentials


Upper Saddle River, New Jersey: Pearson Education.

M. Topical Outline:


Firewalls and their usage



A. Firewalls hardware and software

B. Static Packet
Filter firewall

C. Stateful firewalls

D. Application firewalls

E. Configuring, testing and maintaining

II. Intrusion Detection software

1 week

A. ID system components

B. Evaluating ID system

C. Ana
lyzing an intrusion

III. Access Control and Site Security

2 weeks

A. Managing users and groups

B. Managing permissions

C. Testing for vulnerabilities

D. Hardening clients

IV, Secure E

1 week


B. E
mail attacks on SMTP

V. Attack Methods

2 weeks

A. system penetration

B. denial of service

C. malware attacks

D. Packet sniffers

VI. Viruses

2 weeks

A. Taxonomy

B. Bootstr
ap virus

C. Parasitic Virus

D. Companion virus

E. Macro virus

VII. Operating Systems Security Holes

2 weeks

A. File, directory and shared resource security

B. Operating Systems Security procedures

VIII. Wireless Security Flaws

1 week

A. Wireless networking attack methods

B. Wireless security measures

N. Prepared by:

Donna Marie Kaputa PhD.