Vice President/ Academic Affairs Office use only
STATE UNIVERSITY OF NEW YORK
College of Technology at Alfred
School of M
anagement and Engineering Technology
Network Admin CISY 5203; Linux Admin CISY3613
2 hours lecture/week
2 hours laboratory/week
Date Approved by Faculty Senate:___________________
This course will provide a practical, hands
on approach to a myriad of sec
urity tools employed in
. These security tools will include: Industry Standard Firewalls,
Virtual Private Networks (VPNs), wired network vulnerability scanners,
wireless security probes,
wireless intrusion detectors, wireless scanners and wireless encryption cracking utilities
Firewall advanced concepts and technologies will be covered in depth to include design
considerations for enterprise networks, large company networks and medium business networks.
The course will include VPN concepts, technologies, and configurations fo
r site to site VPNs as
well as configurations for client remote access VPNs. The course will cover various
vulnerability scanners for networks with heterogeneous operating systems and advanced firewall
This course will emphasize d
g secure wireless networks and protecting
em from unauthorized intrusions.
Students, in a laboratory environment, will attack and defend
networks and submit a project paper detailing lessons learned and how
defend both wired
The course assumes a prerequisite knowledge of network operating
systems and security concepts.
At the end of the course the student will be able to do the following:
Choose the appropriate implementation of industry standard fire
walls, Intrusion Detection
Systems (IDSs) and vulnerability scanners for enterprise networks, large company
networks and medium company networks.
Select and c
onfigure industry standard firewall Interfaces, global addresses, Network
Address Translation (NA
T), routing for inside and outside network interfaces and ha
thorough understanding of industry standard Command Line Interface (CLI) syntaxes
Configure industry standard firewall Access Control Lists (ACLs) and content filtering
y standard firewall object grouping feature
Compare and contrast the
erabilities associated with
Specify and d
efend against security
in the TCP/IP protocol.
Configure authentication schemes, NAT, content security an
d content vectoring,
SYNDefender, and VPNs using industry standard Firewalls.
Scan a network with heterogeneous operating systems and identify security
ous wireless security tools.
Create a plan to
protect wireless networks
from unauthorized access.
, Stephen, Karen Frederick
Inside Network Perimeter Security: The
Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion
DIVISION OF SUBJECT MATTER
Wireless Network Security
Advanced Firewall Configuration
VPN advanced configuration
Intrusion Detection Systems
Attack and Defend Tech
Other Network Security Tools
Network Security Case Studies
*Labs have outside student preparation beyond scheduled laboratory time.
Snort 2.1 Intrusion Detection, Second Edition
ess Publishing, 2004.
802.11 Wireless Networks: The Definitive Guide Creating and Administering
O'Reilly Media Inc., 2002
, Latest Edition
Network Intrusion Detection
New Riders Publishing, 2000.
Guide to Wireless Network Security
Dean of School
Instructor of Course