DA 200 Computer and Network Security Course Outline

smileybloatNetworking and Communications

Nov 20, 2013 (3 years and 11 months ago)

65 views

Course Outline


A. Course Number and Title:

DA
200

Computer and Network Security


Pre
-
requisite: DA 1
07 Introduction to Information
Systems Security

B. Curriculum:




Information Technology (1492), Technical elective

C. Course Description:


This c
ourse provides an overview of the setup and use of
firewalls. Securing e
-
mail servers will be discussed. Also,
approaches for detecting and responding to buffer attacks will be
discussed and demonstrated. Viruses, operating systems security
holes, along wi
th impersonation, spoofing and wireless security
flaws will be discussed.















D. Duration of Instructional Period:

150 minutes/week/15 weeks


classroom






100 minutes/week/15 weeks


laboratory






3,750 minutes/semester (4) credit hour
s

E. Lecture/Lab/Credit Hours:


3
-
2
-
4

F. Suggested Text(s):



Guide to Network
Defense & Countermeasures






Randy Weaver


Thomson, Course Technology, Copyright 2006






ISBN:
978
-
141
-
8836
-
795

G. Course Outcomes:




Upon completion, the student will be able to:






1. Describe and understand what a firewall is






2. Describe intrusion detection software and what it is used for





3. Identify various encryption/decryption co
ncepts





4. Discuss various methodologies relating to e
-
mail security




5. Analyze network security with regard to firewalls, tripwires,




intrusion detection









6. Have an understanding of approaches for detection and




responding to buf
fer attacks








7. Have a working knowledge of operating system security




holes and all application vulnerabilities







8. Identify and correct wireless security flaws



H. Program Competencies:

1. Demonstrate knowledge of a broad business and rea
l world
perspectives of information technology




2. Demonstrate analytical and critical thinking skills



3. Demonstrate the ability to apply analytical and logical
thinking to gathering and analyzing information, designing and
testing soluti
ons to problems and formulating plans


4. Demonstrate the ability to visualize and articulate complex
problems and concepts






5. Use and apply current technical concepts and practices in the
core information technologies






6. Design effective and usable IT
-
based solutions and integrate
those components into the user environment



7. Identify and evaluate current and emerging technologies and
assess their applicability to address the users’ needs

8. Demonstrate an understanding of best practices, standards and
their application






9. Demonstrate independent critical thinking and problem
solving skills

10. Communicate effectively and efficiently with clients, users
and peers both verbally and in writing, using appropriate
terminology





I. SUNY General Education Knowledge and Skills:

NA

J. ECC Graduate Learning Outcomes (GLO):














1. To identify and logically analyze problems and issues and to






propose a
nd evaluate solutions (Related Course Objectives 4,5)






2.To apply appropriate mathematical procedures and quantitative





methods (Related Course Objectives 1
-
8)








3. To read critically (Related Course Objectives 1
-
8)







4. To operate a co
mputer (Related Course Objectives 1
-
8)











K. Assessment of Student Learning
: Six (6) laboratory exercises @ 30 pts each

180







(participative & written)











Midterm Exam






60







Final Exam






60








Total Possible Points



3
00

L. Library Resources:


Students are encouraged to use the resources of the computer
labs on campus. Library resources should also be used.

Pfleeger, C. and Pfleeger, S.L. (2002).
Security in Computing
.
Upper Saddle River, New Jersey: Pearson Edu
cation.

Stallings, W. (2003).
Network Security Essentials
.


`

Upper Saddle River, New Jersey: Pearson Education.




M. Topical Outline:


I.

Firewalls and their usage






3

week
s





A. Firewalls hardware and software









B. Static Packet
Filter firewall









C. Stateful firewalls










D. Application firewalls










E. Configuring, testing and maintaining


II. Intrusion Detection software






1 week



A. ID system components










B. Evaluating ID system










C. Ana
lyzing an intrusion

III. Access Control and Site Security






2 weeks



A. Managing users and groups










B. Managing permissions










C. Testing for vulnerabilities









D. Hardening clients


IV, Secure E
-
mail









1 week


A. SM
TP











B. E
-
mail attacks on SMTP










V. Attack Methods







2 weeks


A. system penetration











B. denial of service










C. malware attacks










D. Packet sniffers

VI. Viruses








2 weeks


A. Taxonomy











B. Bootstr
ap virus










C. Parasitic Virus










D. Companion virus











E. Macro virus




VII. Operating Systems Security Holes





2 weeks


A. File, directory and shared resource security


B. Operating Systems Security procedures










VIII. Wireless Security Flaws






1 week


A. Wireless networking attack methods










B. Wireless security measures











N. Prepared by:

Donna Marie Kaputa PhD.