View Syllabus - Walla Walla Community College

snottysurfsideΔιακομιστές

9 Δεκ 2013 (πριν από 3 χρόνια και 10 μήνες)

114 εμφανίσεις

Pierce College

Course Syllabus

COURSE TITLE
:

Fundamentals of Network Security

ABBREVIATION:


CNE 254

CREDIT HOURS:


5



Meeting time: MW, 5:30
-
7:40 pm

Location: CTR C172

INSTRUCTOR:


Vicki Romero

How to contact
me

Please contact me is via Angel email.



REQUIRED TEXT AND MATERIALS
:



CompTIA Security+ Deluxe Study Guide: SY0
-
201,
Emmett Dulaney,
Sybex,
ISBN: 13: 978
-
0
-
470
-
37296
-
8



E
-
book included



USB drive (at least 1GB recommended)



Angel Learning at
http://angel.pcd.edu/

COURSE Description:

CIS 134
: Microcomputer Operating Systems


This course tea This course teaches students, through lectures, discussions, scenarios, demonstrations, chapter review que
stions,
textbook exercises, and classroom l
abs, the knowledge necessary to understand core concepts of computer security.
The course takes the student through key concepts of understanding threats to a computing infrastructure, securing
a network infrastructure, understanding encryption technologie
s, securing communications and applications, and
responding to incidents. The course was developed for students who want to learn how to create and maintain a
secure network infrastructure.

This course prepares students to take the
Security+ Certificatio
n

exam administered by the Computing Technology
Industry Association (CompTIA).


Course Objectives:

By the end of the quarter, the student will be able to:



1. Describe the components of risk assessment.



Identify common threats to a computing
infrastructure.



Describe common types of attacks and malicious code.



List common defenses against threats.



Apply basic security guidelines.



Explain the role of security baselines.



Establish a security baseline.



Monitor and maintain a security baseline.



Ide
ntify access control methods.



Identify authentication methods.



Choose authentication and access control strategies.



Describe basic principles and uses of cryptography.



Explain the uses of symmetric encryption.



Explain the uses of hash functions.



Explain th
e uses of public key encryption.



Describe how cryptography is applied.



Explain what certificates are and how they are used.



Describe how a public key infrastructure distributes cryptographic keys.



Describe the certificate life cycle.



Explain how trust mode
ls allow a public key infrastructure to function.



Describe practical applications of a public key infrastructure (PKI).



Describe how features of TCP/IP relate to network security.



Explain vulnerabilities that occur at various TCP/IP layers.



Describe securi
ty for network cabling.



Describe security for network connectivity devices.



Describe procedures for detecting intrusion attempts.



Respond to security incidents.



Explain how to secure remote connections.



Describe how to secure wireless communications.



Describe how to use IP Security (IPSec) to secure network communications.



Identify common attacks against Web servers and explain how to protect against them.



Identify common attacks against Web browsers and explain how to protect against them



Identify co
mmon attacks against DNS and explain how to protect against them.



Identify common attacks against DHCP and explain how to protect against them.



Explain basic concepts of Internet messaging.



Describe how to secure mail servers.



Describe how to secure mail
clients.



Describe how to secure instant messaging (IM).



Establish secure topologies.



Secure network perimeters.



Implement firewalls.



Identify steps for establishing site security.



Secure removable media.



Secure mobile devices.



Securely dispose of equipment
.



Identify methods for protecting business continuity.



Maintain documentation, policies, and procedures.



Assess risks.



Establish security education.



ACADEMIC HONESTY:


If you use another person’s ideas, words, music, artwork, computations, models, etc.,
in such a manner as to imply
that the thing used was your own; or if you use notes, tests or memory aids during tests when such use was not
expressly authorized; or if you steal or knowingly use test master copies to gain information prior to an examinatio
n
date; or knowingly allow another person to use your work as if it were that other person’s work; or otherwise act in
such a manner as to gain for yourself or another an unfair advantage over other students, you will face disciplinary
actions.
Cheating a
nd plagiarism will not be tolerated and will put you in danger of failing the course.
All work must
be your own.


CLASS PARTICIPATION
:

It is the student’s responsibility to actively participate in the course, and be responsible for all material described in
the syllabus. If you are going to drop this course, you must formally withdraw. If you just stop doing coursework, you
will receive
a failing grade on your permanent record. You will not be given an Incomplete as a grade…so, don’t ask.


SKILL ASSESSMENT
:

9

Quizes at 100 points each (Total
900

pts)

There will be unit exams due at the end of each chapter.


Exams will be taken online
with the blackboard
system. You will get instant feedback when completed on your score.

9

Sets of Lab Activities at 100 points each (Total
900

pts)



Lab activities will be assigned.


You will complete every lab and turn in a short lab report for each ch
apter.


The lab activities are due on the due date listed on the attached schedule.


The lab activities are due on the
due date listed on the attached schedule.


ALL OF THE DUE DATES ARE TENTATIVE, SO REFER TO THE ANGEL
LEARNING SITE FOR THE MOST RECENT UP
DATE ON THE DUE DATES.

Final Exam at
400

points

The final exams will take two hours to complete.


The final exam may not be retaken. The final exam will test the
student’s comprehension of the material from the books, as well as any additional material tha
t is presented in the
lectures.


UserName
:

Your username for the departmental Web Server consists of the first letter of your first name followed by your last
name. Your password consists of your first name, first letter uppercase all other letters lowerc
ase, followed by the
last four digits of your student ID number. For example for William Smith with a SID of 123
-
45
-
6789:

Username:

wsmith

(not case sensitive)

Password:

William6789

(
case sensitive
)


COURSE SCHEDULE:

(subject to change)

Week
starting

Activity

Assignment

Week 1

Mon Mar 2
8

Chapter 1.

General Security Concepts

Understanding Information Security

Understanding the Goals of Information Security

Comprehending the Security Process

Lab 1.1 Update a Linux System

Lab 1.2 Update a
Windows System



Wed Mar 3
0

Authentication Issues to Consider

Distinguishing between Security Topologies


Week 2

Mon Apr
4

Chapter 2.

Identifying Potential Risks

Calculating Attack Strategies

Recognizing Common Attacks

Identifying TCP/IP Security
Concerns

Understanding Software Exploitation

Lab 2.1 Identify Running Processes on a Windows Machine

Lab 2.2 Identify Running Processes on a Linux Machine


Wed Apr
6

Understanding OVAL

Surviving Malicious Code

Understanding Social Engineering

Introducing
Auditing Processes and Files

Lab B.2 Turn on the Firewall in Windows XP: Method One

Lab B.3 Turn on the Firewall in Windows XP: Method Two

Lab B.4 Create a Baseline for Internet Access

Lab B.5 Turn on a Screensaver Password for Windows XP

Week 3

Mon Apr 1
1

Chapter 3.

Infrastructure and Connectivity

Understanding Infrastructure Security

Understanding the Different Network Infrastructure
Devices

Monitoring and Diagnosing Networks

Securing Workstations and Servers

Understanding Mobile Devices

Lab 3.1 Examine
the Windows Routing Table

Lab 3.2 Examine the Linux Routing Table

Wed Apr 1
3

Understanding Remote Access

Securing Internet Connections

Understanding Network Protocols

The Basics of Cabling, Wires, and Communications

Employing Removable Storage

Lab B.6
Look for Security Events within Windows XP

Lab B.7 Identify User Accounts with Administrator Access in
Windows XP

Lab B.8 Turn on a Screensaver Password for openSUSE

Lab B.9 Change a Password in Linux

Lab B.10 Find SUID and SGID Files in Linux

Week 4

Mon
Apr 1
8

Chapter 4.

Monitoring Activity and Intrusion
Detection

Monitoring the Network

Submit Quizzes 1


3

Lab 4.1 View the Active TCP and UDP Ports

Lab 4.2 Run Windows Network Monitor

Week
starting

Activity

Assignment

Understanding Intrusion Detection Systems

Working with Wireless Systems


Lab 4.3 Install snort in Linux

Lab 4.4 Make File Extensions Visible in Windows XP

Lab 4.5 Monitor Network Traffic in Linux

Wed Apr 2
0

Understanding Instant Messaging’s Features

Working with 8.3 File Naming

Understanding Protocol Analyzers


Understanding
Signal Analysis and Intelligence

Lab B.11 Change ACLs on All Files in a Linux Directory

Lab B.12 Change Permissions on All Files in a Linux Directory

Lab B.13 Change the Default Permissions for All Newly Created
Files in Linux

Lab B.14 View all Linux Login
s

Lab B.15 Change the Group Associated with Files

Week 5

Mon Apr 2
5

Chapter 5.

Implementing and Maintaining a Secure
Network

Overview of Network Security Threats

Defining Security Baselines

Hardening the OS and NOS

Hardening Network Devices

Hardening
Applications

Lab 5.1 Install OpenLDAP on a SuSE Server

Lab 5.2 Work with Performance Monitor and Windows

Lab 5.3 Work with Unix/Linux Networking

Wed Apr 2
7

Hardening NNTP Servers

Hardening File and Print Servers and Services

Hardening DHCP Services

Working with Data Repositories

Lab B.16 View Failed Login Attempts

Lab B.17 Hide a Linux File

Lab B.18 Hide and Access a Windows Share

Lab B.19 Encrypt a Windows File

Lab B.20 Count the Number of Running Linux Processes

Week 6

Mon May
2

Chapter 6.

Securin
g the Network and Environment

Understanding Physical and Network Security

Understanding Business Continuity Planning

Developing Policies, Standards, and Guidelines

Lab B.21 Display the Security Tab in Windows XP

Lab B.22 View Effective Permissions in Windo
ws XP


Wed May
4

Working with Security Standards and ISO99

Public Information

Lab B.23 Turn the Guest Account Off

Lab B.24 View Internet Explorer Security Settings

Lab B.25 Change Internet Explorer Pop
-
up Blocker Settings

Week 7

Mon May
9

Chapter 7.

Cryptography Basics, Methods, and
Standards

An Overview of Cryptography

Understanding Cryptographic Algorithms

Using Cryptographic Systems

Using Public Key Infrastructure

Submit Quizzes 4


6

Lab 7.1 Hash Rules in Windows Server 2003

Lab 7.2 SSL Settings
in Windows Server 2003

Lab 7.3 Encrypting a File System in Linux

Lab 7.4 Look for Errors in IPSec Performance Statistics

Wed May
11

Preparing for Cryptographic Attacks

Understanding Cryptography Standards and Protocols

Understanding Key Management and the

Key Life Cycle

Lab B.26 Prevent a Folder from Being Shared

Lab B.27 Enable openSUSE Firewall

Lab B.28 Configure openSUSE Local Security

Lab B.29 Set the Defaults for New Users

Lab B.30 View Logged Warnings in openSUSE

Week 8

Mon May
16

Chapter 8.

Securit
y Policies and Procedures

Understanding Business Continuity

Reinforcing Vendor Support

Generating Policies and Procedures

Enforcing Privilege Management

Lab 8.1 Use Automated System Recovery in Windows Server
2003

Lab 8.2 Create a Rescue Disk in Linux

Lab 8.3 Create a Backup with SuSE Linux

Wed May
18


Lab B.31 Configure AppArmor

Lab B.32 View AppArmor Reports

Lab B.33 Configure openSUSE as a Kerberos Client

Lab B.34 Configure openSUSE as an LDAP Client

Lab B.35 Turn Off IPv6 in openSUSE

Week 9

Chapter 9.

Security Administration

Lab 9.1 Configure Windows Automatic
Updates

Week
starting

Activity

Assignment

Mon Ma
y
23

Understanding Security Management

Simplifying Security Administration

Understanding Security Awareness and Education

Staying on Top of Security

Regulating Privacy and Security

Lab 9.2 Run the Microsoft Baseline Security Analyzer

Wed May
25


Lab B.36 Turn On Folder Encryption with cipher

Lab B.37 Change the Minimum Password Age

Lab B.38 Compare Your System to a Security Template

Lab B.39 Clear Private Data in Internet Ex
plorer

Lab B.40 Clear Private Data in Firefox

Week 10

Mon May
30

No Classes, Memorial Day


Wed June
1


Submit Quizzes 7


9

Lab B.41 Configure SELinux in Fedora

Lab B.42 Limit Cookies to First Party

Lab B.43 Configure the Phishing Filter

Lab B.44 Add a
Legal Notice

Lab B.45 Configure Windows XP Startup

Week 11

Mon June
6


Lab B.46 Run a Remote Desktop

Lab B.47 Secure the Account Database

Lab B.48 Create a Restore Point

Lab B.49 Return to a Restore Point

Lab B.50 Boot to a Good Configuration

Wed June
8

Final Exam


Note: Students are expected to read each module and additional reading assignments in advance, complete
assignments, module quizzes and exams in accordance with the course schedule.