CIS 156. Firewalls and Intrusion Detection

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CIS 156. Firewalls and Intrusion Detection"

Transcription

1 CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011

2 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal to Curriculum Sub-committee: 5/6/2011 Purpose: New _X_Change Retire If this is a change, what is being changed? (Check ALL that apply) Update Prefix Title Learning Units _X Competencies Format Change _X_ Course Description Course Number _X_ Textbook Credits Prerequisite Effective Semester/Year Fall 2011 Spring 20 Summer 20 COURSE INFORMATION Prefix & Number: Title: CIS 156 Firewalls and Intrusion Detection Catalog Course Description: This course presents basic concepts of network firewall security to prevent intrusion and destruction of computerized information. Credit Hours: 3 Prerequisite(s) Lecture Hours: Lab Hours: 3 0 CIS 153 Network Essentials or permission of Academic Chair Co-requisite(s) Does this course need a separately scheduled lab component? Yes Does this course require additional fees? If so, please explain. Yes _X No _X No Is there a similar course in the course bank? Yes (Please identify.) _X No Articulation: Is this course or an equivalent offered at other two and four-year No X_Yes (Identify the college, subject,

3 universities in Arizona? prefix, number and title: Elective credit at ASU and NAU Writing Across the Curriculum Rationale: Mohave Community College firmly supports the idea that writing can be used to improve education; students who write in their respective content areas will learn more and retain what they learn better than those who don t. Courses in the core curriculum have been identified as Writing Across the Curriculum courses. Minimum standards for the Writing Across the Curriculum riculum component are: 1. The writing assignments should total words. For example, a single report which is 1500 words in length OR a series of essay questions and short papers (example: four 375-word assignments) which total 1500 words could meet the requirement. 2. The writing component will represent at least 10% of a student s final grade in the course. Is this course identified as a Writing Across the Curriculum course? Yes _X No (See addendum for writing rubrics) Intended Course Goals. By the end of the semester, students will be able to: 1. Describe the types and limitations of firewall protection and be able to determine the best hardware and software selections for effective protection. 2. Develop a security policy that defines the responses to security violations and that also reflect an organization s overall security approach. 3. Identify different firewall configuration strategies based on the needs and desired security level of an organization. 4. Configure firewall software and hardware to authenticate and identify users and encrypt data. 5. List the components and essential operations of Virtual Private Networks (VPNs) and create VPN setups such as mesh or hub-and-spoke configurations. 6. Develop an Intrusion Detection System (IDS) and describe appropriate filter rules. Course Competencies and Objectives Competency 1 Explain the basic concepts of network security Objective 1.1 Define the TCP/IP networking design Objective 1.2 Describe the threats to network security Objective 1.3 Explain the goals of network security Objective 1.3 Describe a layered approach to network defense Competency 2 Describe the fundamental concepts and different approaches in analyzing risk analysis Objective 2.1 Explain the process of risk analysis Objective 2.2 Describe the recommended techniques to minimize risk Objective 2.3 Develop a security policy that addresses how an organization should respond to

4 an attach and the procedure for employees to safely handle data and resources Competency 3 Formulate a security policy and identify security policy procedures Objective 3.1 Explain best practices in security policies including gathering support from every level in the company and keeping these policies current Objective 3.2 Explain the importance of ongoing risk analysis and define incident-handling Objective 3.3 Describe the components of conducting risk assessments and security reviews Competency 4 Analyze network traffic signatures as they relate to suspicious events Objective 4.1 Describe the concepts of signature analysis Objective 4.2 Detect normal and suspicious traffic signatures Objective 4.3 Explain the Common Vulnerabilities and Exposures (CVE) standard Competency 5 Explain basic Virtual Private Network (VPN ) concepts Objective 5.1 Define encapsulation, encryption, and authentication in VPNs Objective 5.2 Summarize the advantages and disadvantages of VPNs Objective 5.3 Discuss the rationale for developing a VPN in a business including convenience and cost effectiveness as compared to the higher security risks of such a system Competency 6 Implement a VPN Objective 6.1 Describe the steps and software necessary to configure a VPN with and without firewalls Objective 6.2 Construct packet-filtering rules for VPNs Objective 6.3 Develop appropriate guidelines for auditing VPNs and VPN policies Competency 7 Identify the components of an Intrusion Detection System (IDS) Objective 7.1 List the appropriate steps of detecting unauthorized access to a networked system including : gathering data, sending alert messages, and automatic responses from an IDS system Objective 7.2 Describe options for implementing intrusion detection systems Objective 7.3 Evaluate different types of IDS products Competency 8 Configure an IDS and create filter rules Objective 8.1 Construct a security incident response team or contact person for your organization Objective 8.2 Explain the six-step incident response process Objective 8.3 Describe the recommended procedure in responding to false alarms to reduce reoccurrences Competency 9 Evaluate firewall hardware and software options Objective 9.1 List the functions of a firewalls Objective 9.2 Create a set of rules and restrictions for a firewall Objective 9.3 Compare the reliability, costs, and difficulty of implementation of various hardware and software firewalls Competency 10 Describe the requirements for securing network perimeters Objective 10.1 Define a bastion host and its function as a gateway between an inside and an outside network Objective 10.2 Explain how to supplement a firewall with a proxy server Objective 10.3 List the considerations necessary when deciding what type of authentication to use: user, session, or client Competency 11 Describe the recommended procedures in firewall management to improve security of digital information Objective 11.1 Manage firewalls to improve security Objective 11.2 Describe the types of log files that most of the firewalls offer, including: security, system, traffic, active, and audit logs Objective 11.3 Explain the parameters needed when choosing a firewall computer including the processor speed, amount of available Random Access Memory (RAM), and cache storage Competency 12 Develop procedures to manage and improve information security Objective 12.1 Compare the advantages and disadvantages of centralized data collection Objective 12.2 Describe the events that you need to monitor, including: logins, creation of

5 user accounts and groups, correct handling of attachments, backups, and antivirus scanning and control Objective 12.3 Describe the steps for training your security personnel to respond to security incidents and the importance of keeping informed of industry trends and innovations in the security field Teacher s Guide Course Textbook, Materials and Equipment Textbook(s) Title Guide to Firewalls and VPNs, 3rd Edition or most recent edition Author(s) Weaver Publisher Course Technology 2011 ISBN Software/ Equipment Textbook Costs Title Author(s) Publisher ISBN Please indicate how much the textbook would cost if purchased through Barnes & Noble: $ Modality X On-ground X On-line Course Assessments Description of Possible Course Assessments (Essays, multiple choice, etc.) Exams standardized for this course? Midterm Final Other (Please specify): Are exams required by the department? Yes _X No If Yes, please specify: Where can faculty members locate or access the required standardized exams for this course? (Contact Person and Location) Example: NCK Academic Chair Office Student Outcomes: Identify the general education goals for student learning that is a component of this course. Check all that apply: 1. Communicate effectively. a. Read and comprehend at a college level. b. Write effectively in a college setting. 2. Demonstrate effective quantitative reasoning and Method of Assessment Develop a security policy plan for distribution to all employees in an organization.

6 problem solving skills. 3. Demonstrate effective qualitative reasoning skills. Evaluate security options for effectiveness and costs to prevent loss of information data. 4. Apply effective methods of inquiry. a. Generate research paper by gathering information from varied sources, analyzing data and organizing information into a coherent structure. b. Employ the scientific method. 5. Demonstrate sensitivity to diversity a. Experience the creative products of humanity. b. Describe alternate historical, cultural, global perspectives.

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

CIS 270. Systems Analysis and Design

CIS 270. Systems Analysis and Design CIS 270 Systems Analysis and Design Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to

More information

PAR 201. Legal Research and Writing II. Course Package

PAR 201. Legal Research and Writing II. Course Package PAR 201 Legal Research and Writing II Course Package Approved November 5, 2010 Effective Spring 2011 COURSE PACKAGE FORM Team Leader and Members Date of proposal to Curriculum Sub-committee: Candace Hofstadler

More information

MEA 116. Electronic Medical Records. Course Package

MEA 116. Electronic Medical Records. Course Package MEA 116 Electronic Medical Records Course Package Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue

More information

MEA 141. Medical Billing. Course Package

MEA 141. Medical Billing. Course Package MEA 141 Medical Billing Course Package Approved: December 3, 2010 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue Date of proposal

More information

CIS 241 INTRODUCTION TO E-COMMERCE

CIS 241 INTRODUCTION TO E-COMMERCE CIS 241 INTRODUCTION TO E-COMMERCE APPROVED 11/09/2011 EFFECTIVE FALL 2012-13 Prefix & Number CIS 241 Course Title: E-Commerce Technology Purpose of this submission: New Change/Updated Retire If this is

More information

MEA 130 MEDICAL CODING I (ICD-10-CM)

MEA 130 MEDICAL CODING I (ICD-10-CM) MEA 130 MEDICAL CODING I (ICD-10-CM) PRESENTED FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 130 Course Title: Medical Coding I ICD-10-CM Purpose of this submission: New Change/Updated Retire

More information

CHD 246 CO-OCCURRING DISORDERS

CHD 246 CO-OCCURRING DISORDERS CHD 246 CO-OCCURRING DISORDERS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 246 Course Title: Co-Occurring Disorders Purpose of this submission: New Change/Updated

More information

CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT

CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 270 Course Title: Clinical Strategies in Substance Abuse Treatment

More information

CHD 125 ETHICS IN SUBSTANCE ABUSE COUNSELING

CHD 125 ETHICS IN SUBSTANCE ABUSE COUNSELING CHD 125 ETHICS IN SUBSTANCE ABUSE COUNSELING PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 125 Course : Ethics in Substance Abuse Counseling Purpose of this submission:

More information

MUS 101 APPRECIATION AND LITERATURE OF MUSIC

MUS 101 APPRECIATION AND LITERATURE OF MUSIC MUS 101 APPRECIATION AND LITERATURE OF MUSIC APPROVED 12/02/2011 EFFECTIVE FALL 2012-13 Prefix & Number MUS 101 Course Title: Appreciation and Literature of Music Purpose of this submission: New X Change/Updated

More information

CIS 280. Computer Information Systems Internship. Course Package

CIS 280. Computer Information Systems Internship. Course Package 1 CIS 280 Computer Information Systems Internship Course Package Approved August 6, 2009 2 COURSE PACKAGE FORM Contact person(s) Andra Goldberg & Matt Butcher Date of proposal to Fall 2009 Curriculum Committee

More information

BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS

BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUE130 Course Title: Financial Management for Entrepreneurs Purpose of this submission:

More information

ASE 133 AUTO HVAC SYSTEMS

ASE 133 AUTO HVAC SYSTEMS ASE 133 AUTO HVAC SYSTEMS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number ASE 133 Course : Auto HVAC Systems Purpose of this submission: New Change/Updated Retire If this

More information

BUS 221 FINANCIAL ACCOUNTING

BUS 221 FINANCIAL ACCOUNTING BUS 221 FINANCIAL ACCOUNTING PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number BUS 221 Course Title: Financial Accounting Purpose of this submission: New X Change/Updated Retire

More information

MEA 110 ADMINISTRATIVE MEDICAL ASSISTING

MEA 110 ADMINISTRATIVE MEDICAL ASSISTING MEA 110 ADMINISTRATIVE MEDICAL ASSISTING PRESENTED: FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 110 Course Title: Administrative Medical Assisting Purpose of this submission: New Change/Updated

More information

AJS 245 ETHICS IN CRIMINAL JUSTICE

AJS 245 ETHICS IN CRIMINAL JUSTICE AJS 245 ETHICS IN CRIMINAL JUSTICE PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number AJS 245 Purpose of this submission: To update format, add Writing Across the Curriculum

More information

ENG 136 TECHNICAL PROFESSIONAL WRITING

ENG 136 TECHNICAL PROFESSIONAL WRITING ENG 136 TECHNICAL PROFESSIONAL WRITING PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE - FALL 2012-13 Prefix & Number ENG 136 Course Title: Technical/Professional Writing Purpose of this submission: Update

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

BUS 204 BUSINESS COMMUNICATIONS

BUS 204 BUSINESS COMMUNICATIONS BUS 204 BUSINESS COMMUNICATIONS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUS 204 Course Title: Business Communications Purpose of this submission: New Change/Updated

More information

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE Presented and Approved: December 7, 2012 Effective: Fall 2013-14 Prefix & Number AJS 101 Course Title: Introduction to Administration of Justice Purpose

More information

GLG 110 ENVIRONMENTAL GEOLOGY AND NATURAL DISASTERS WITH LAB

GLG 110 ENVIRONMENTAL GEOLOGY AND NATURAL DISASTERS WITH LAB GLG 110 ENVIRONMENTAL GEOLOGY AND NATURAL DISASTERS WITH LAB (TITLE CHANGE ONLY OCT. 2013) PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number GLG 110 Course Title: Environmental

More information

ACC 135. Course Package

ACC 135. Course Package 1 ACC 135 Accounting Systems and Procedures Course Package Approved August 6, 2009 2. COURSE PACKAGE FORM Contact person(s) Dr. Eric Aurand, Dr. James Childe Date of proposal to Fall 2009 Curriculum Committee

More information

DAE 115. Office Management for the Dental Assistant. Course Package

DAE 115. Office Management for the Dental Assistant. Course Package DAE 115 Office Management for the Dental Assistant Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee: Kathleen R. Baleno February

More information

ECE 274 Practicum. Course Package

ECE 274 Practicum. Course Package ECE 274 Practicum Course Package Approved December 4, 2009 COURSE PACKAGE FORM Contact Person (s) Eric Aurand / Peggy Federici Date of proposal to Curriculum Sub-committee: December 2009 Purpose: New _X_Change

More information

BUE 275 EFFECTIVE LEADERSHIP FOR ENTREPRENEURS

BUE 275 EFFECTIVE LEADERSHIP FOR ENTREPRENEURS BUE 275 EFFECTIVE LEADERSHIP FOR ENTREPRENEURS PRESENTED AND APPROVED: MARCH 2, 2012 EFFECTIVE FALL 2012-13 Prefix & Number BUE 275 Course Title: Effective Leadership for Entrepreneurs Purpose of this

More information

AJS 260. Procedural Criminal Law. Course Package

AJS 260. Procedural Criminal Law. Course Package AJS 260 Procedural Criminal Law Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Michael S. Messner Date of proposal to Curriculum Sub-committee: 02/12/10 Purpose: New _X_Change

More information

HVA 120 RESIDENTIAL HVAC INSTALLATION

HVA 120 RESIDENTIAL HVAC INSTALLATION HVA 120 RESIDENTIAL HVAC INSTALLATION PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number HVA 120 Course Title: Residential HVAC Installation Purpose of this submission: New

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring

More information

BUS 222 MANAGERIAL ACCOUNTING

BUS 222 MANAGERIAL ACCOUNTING BUS 222 MANAGERIAL ACCOUNTING PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number BUS 222 Course Title: Managerial Accounting Purpose of this submission: New X Change/Updated

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14. MCC Form EDU 0007 (rev.

INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14. MCC Form EDU 0007 (rev. AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number AJS 225 Purpose of this submission: To update format, add Writing Across the Curriculum component, and

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Commercial/Industrial Electricity

Commercial/Industrial Electricity 1 ELC 210 Commercial/Industrial Electricity Course Package Presented and Approved July 31, 2008 2 Contact person(s) DAVE WHITE Date of proposal to JULY 31, 2008 Curriculum Committee NEW COURSE PACKAGE

More information

New York City College of Technology Computer Systems Technology Department

New York City College of Technology Computer Systems Technology Department New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall? What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to

More information

BIO 201 ANATOMY AND PHYSIOLOGY I with LAB

BIO 201 ANATOMY AND PHYSIOLOGY I with LAB BIO 201 ANATOMY AND PHYSIOLOGY I with LAB (Title change ONLY Oct. 2013) Presented and Approved: January 12, 2012 Effective: 2012-13 FA Prefix & Number BIO 201 Course Title: Anatomy and Physiology I Purpose

More information

CDA 102A. Physical Development. Course Package/Modification/Retirement NEW

CDA 102A. Physical Development. Course Package/Modification/Retirement NEW CDA 102A Physical Development Course Package/Modification/Retirement NEW Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee:

More information

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Maruleng Local Municipality

Maruleng Local Municipality Maruleng Local Municipality. 22 November 2011 1 Version Control Version Date Author(s) Details 1.1 23/03/2012 Masilo Modiba New Policy 2 Contents ICT Firewall Policy 1 Version Control.2 1. Introduction.....4

More information

Firewall Architectures of E-Commerce

Firewall Architectures of E-Commerce Firewall Architectures of E-Commerce EE657 Midterm Project Presentation Professor Hwang Andy Yan Four State-of-the-art Firewall Architectures Description of 4 solutions IBM enetwork Compaq AXENT s Raptor

More information

ICAB5238B Build a highly secure firewall

ICAB5238B Build a highly secure firewall ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

MERCER COUNTY COMMUNITY COLLEGE. Division of Business and Technology NET 240

MERCER COUNTY COMMUNITY COLLEGE. Division of Business and Technology NET 240 MERCER COUNTY COMMUNITY COLLEGE Division of Business and Technology COURSE DESCRIPTION: Course Description: Students learn, in depth, the various network security principles, features, protocols, and implementations

More information

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of

More information

Effective Fall 2016 New Course Proposal CMN 3020, Public Relations Research, Evaluation, and Measurement. 2. Course prefix and number: CMN 3020

Effective Fall 2016 New Course Proposal CMN 3020, Public Relations Research, Evaluation, and Measurement. 2. Course prefix and number: CMN 3020 Agenda Item #15-137 Eastern Illinois University Effective Fall 2016 New Course Proposal CMN 3020, Public Relations Research, Evaluation, and Measurement Banner/Catalog Information (Coversheet) 1. New Course

More information

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and

More information

NAP 117 MEDICATION ASSISTANT COURSE

NAP 117 MEDICATION ASSISTANT COURSE NAP 117 MEDICATION ASSISTANT COURSE APPROVED: JANUARY 12, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number NAP 117 Course Title: Medication Assistant Course Purpose of this submission: New Course New Change/Updated

More information

Fireware Essentials Exam Study Guide

Fireware Essentials Exam Study Guide Fireware Essentials Exam Study Guide The Fireware Essentials exam tests your knowledge of how to configure, manage, and monitor a WatchGuard Firebox that runs Fireware OS. This exam is appropriate for

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Georgia Perimeter College Faculty Senate

Georgia Perimeter College Faculty Senate 1 Georgia Perimeter College Faculty Senate Curriculum Proposal Cover Sheet (Course, Program, and Core) Title of Proposal: Assignment of LIST 2020 to Area F (Certificate) Number: Date Submitted: Date approved:

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

Security Administration R77

Security Administration R77 Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Best Practices For Department Server and Enterprise System Checklist

Best Practices For Department Server and Enterprise System Checklist Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Information Security @ Blue Valley Schools FEBRUARY 2015

Information Security @ Blue Valley Schools FEBRUARY 2015 Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that

More information

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 COURSE SYLLABUS Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd, Fairfield,

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 1173 PREREQUISITE(S): COREQUISITE(S): Desktop Operating Systems None None CREDIT HOURS: 3 CONTACT

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

CNA 432/532 OSI Layers Security

CNA 432/532 OSI Layers Security CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: aoolagunju@stcloudstate.edu Office Hrs: 3-4 MW, Office: ECC256 Other

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

Internet Services & Protocols

Internet Services & Protocols Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information