SOUTH PUGET SOUND

weepingwaterpickSécurité

23 févr. 2014 (il y a 3 années et 4 mois)

198 vue(s)




SOUTH
PUGET SOUND

COMMUNITY COLLEGE


T
ITLE
:


Introduction to Network Security

D
EPT
:

CNA

N
O
.

210

C
REDITS

5



COURSE OUTLINE


COURSE DESCRIPTION:


Introduction to securing network resources. Evaluation of network security from a
global perspective. Incorporates media security, network vulnerabilities, and authentication protocols. Basic
cryptography, operating system security, and Internet security practices. Preparation for the CompTIA Security +
Exam.



Prerequisite:


CN
A 101, C
NA 121, CNA 122.




I.


I
NSTRUCTIONAL
R
ESOURCES
:

A.

Text and/or learning resources will be selected appropriate

to course content. Refer to individual
professor’s syllabus for details.

II.

S
TUDENT LEARNING OUTC
OMES
:


Upon completion of the course, the student will be able to:

A.

List and describe the common threats to network security.

B.

Evaluate authentication protocol
s for security vulnerabilities.

C.

Describe the major types of attacks against computer networks.

D.

Describe the major Remote Access Protocols and their security vulnerabilities.

E.

Assess e
-
mail vulnerabilities and security.

F.

Identify Instant messaging and Interne
t security weaknesses.

G.

Appraise LDAP and File Transfer security.

H.

Analyze wireless network security.

I.

Describe the security functions and vulnerabilities of various network devices such as switches,
routers and firewalls.

J.

Evaluate security threats to transmi
ssion and storage media.

K.

Identify and evaluate firewall implementation strategies.

L.

Explain the functions and implementations of Intrusion Detection Systems and honeypots.

M.

Configure operating system, file and network services security.

N.

Explain basic
cryptographic terminology and procedures.

O.

Describe procedures and methods of providing physical security.

P.

Evaluate Disaster Recovery procedures.

Q.

Delineate basic computer forensic methods.


III.

C
OLLEGE
-
WIDE ABILITIES
:

A.

Think logically and critically.

B.

Evalua
te and process quantitative and symbolic data.

C.

Understand ethical responsibilities and consequences.



IV.

C
OURSE CONTENT
:

A.

List and describe the common threats to network security
:

a.

Data integrity, confidentiality, and availability
.

b.

Primary weaknesses for
network security
.

c.

Goals of network security
.

B.

Evaluate authentication protocols for security vulnerabilities
:

a.

Password security
.

b.

Kerberos authentication
.

c.

Challenge Handshake Authentication Protocol (CHAP)
.




SOUTH
PUGET SOUND

COMMUNITY COLLEGE


T
ITLE
:


Introduction to Network Security

D
EPT
:

CNA

N
O
.

210

C
REDITS

5


d.

Certificate Authorities
.

e.

Security Tokens
.

f.

Biometric

authentication
.

g.

Multifactor Authentication
.

C.

Describe the major types of attacks against computer networks
:

a.

Denial of Service Attacks (DOS)
.

b.

Distributed Denial of Service Attacks (DDOS)
.

c.

Spoofing
.

d.

Man
-
in
-
the
-
Middle Attacks
.

e.

Social Engineering
.

f.

Encryption
attacks
.

g.

Malware
.

D.

Describe the major Remote Access Protocols and their security vulnerabilities
:

a.

IEEE 802.1x and RADIUS
.

b.

Telnet
.

c.

VPNs
.

d.

TACACS
.

e.

PPTP
.

f.

L2TP
.

g.

SSH
.

h.

IPSec
.

E.

Assess e
-
mail vulnerabilities and security
:

a.

E
-
mail encryption technologies
.

b.

Secure e
-
mail

protocols
.

c.

E
-
mail vulnerabilities
.

F.

Identify Instant messaging and Internet security weaknesses
:

a.

SSL and TLS
.

b.

HTTPS
.

c.

Instant messaging
.

d.

Web vulnerabilities
.

G.

Appraise LDAP and File Transfer security
:

a.

Lightweight Directory Access Protocol (LDAP) structure
and weaknesses
.

b.

File Transfer Protocol (FTP) security
.

c.

File sharing precautions
.

H.

Analyze wireless network security
:

a.

Wireless Access Protocol (WAP) security
.

b.

Wired Equivalent Privacy (WEP) defenses
.

c.

Wireless site surveys
.

I.

Describe the security functions and

vulnerabilities of various network devices such as switches,
routers and firewalls
:

a.

Firewall function
.

b.

Router and switch security issues
.

c.

Modem vulnerabilities
.

d.

Intrusion Detection System setup and operation
.

e.

Network monitoring
.

J.

Evaluate security threats
to transmission and storage media
:

a.

Transmission media security
.

b.

Storage media security
.

K.

Identify and evaluate firewall implementation strategies
:

a.

Firewall system architecture
.




SOUTH
PUGET SOUND

COMMUNITY COLLEGE


T
ITLE
:


Introduction to Network Security

D
EPT
:

CNA

N
O
.

210

C
REDITS

5


b.

Network Address Translation (NAT)
.

c.

Virtual Local Area Network (VLAN) security
.

L.

Explain the functions and implementations of Intrusion Detection Systems and honeypots
:

a.

Intrusion Detection Systems
.

b.

Active vs. passive intrusion detection
.

c.

Honeypot design and deployment
.

d.

Incident response procedures
.

M.

Configure operating system, file and
network services security
:

a.

Using security groups
.

b.

Configuring access controls
.

c.

Enabling and disabling protocols
.

d.

Application server hardening
.

N.

Explain basic cryptographic terminology and procedures
:

a.

Hashing algorithms
.

b.

Symmetric and asymmetric algorithms
.

c.

Digital signatures
.

d.

Digital certificates
.

e.

Certificate management
.

O.

Describe procedures and methods of providing physical security
:

a.

Physical barriers and controls
.

b.

Technical controls
.

P.

Evaluate Disaster Recovery procedures
:

a.

Disaster recovery
.

b.

Security policie
s and procedures
.

Q.

Delineate basic computer forensic methods
:

a.

Computer forensics
.

b.

Risk management
.

c.

Documentation
.

V.

E
VALUATION
:

A.

Tests:



45%

B.

Assignments:


25%

C.

Final:



25%

D.

Classroom Etiquette:

5%

E.

Grading:





A 93
-
100%

A
-

90
-

92%



B+ 87
-

89%

B 83
-

86%

B
-

80
-

82%


C+ 77
-

79%

C 73
-

76%

C
-

70
-

72%


D+ 67
-

69%

D 6
0

-

66%



F 59% Or lower