CIS 156. Firewalls and Intrusion Detection
|
|
|
- Felicity Harrington
- 10 years ago
- Views:
Transcription
1 CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011
2 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal to Curriculum Sub-committee: 5/6/2011 Purpose: New _X_Change Retire If this is a change, what is being changed? (Check ALL that apply) Update Prefix Title Learning Units _X Competencies Format Change _X_ Course Description Course Number _X_ Textbook Credits Prerequisite Effective Semester/Year Fall 2011 Spring 20 Summer 20 COURSE INFORMATION Prefix & Number: Title: CIS 156 Firewalls and Intrusion Detection Catalog Course Description: This course presents basic concepts of network firewall security to prevent intrusion and destruction of computerized information. Credit Hours: 3 Prerequisite(s) Lecture Hours: Lab Hours: 3 0 CIS 153 Network Essentials or permission of Academic Chair Co-requisite(s) Does this course need a separately scheduled lab component? Yes Does this course require additional fees? If so, please explain. Yes _X No _X No Is there a similar course in the course bank? Yes (Please identify.) _X No Articulation: Is this course or an equivalent offered at other two and four-year No X_Yes (Identify the college, subject,
3 universities in Arizona? prefix, number and title: Elective credit at ASU and NAU Writing Across the Curriculum Rationale: Mohave Community College firmly supports the idea that writing can be used to improve education; students who write in their respective content areas will learn more and retain what they learn better than those who don t. Courses in the core curriculum have been identified as Writing Across the Curriculum courses. Minimum standards for the Writing Across the Curriculum riculum component are: 1. The writing assignments should total words. For example, a single report which is 1500 words in length OR a series of essay questions and short papers (example: four 375-word assignments) which total 1500 words could meet the requirement. 2. The writing component will represent at least 10% of a student s final grade in the course. Is this course identified as a Writing Across the Curriculum course? Yes _X No (See addendum for writing rubrics) Intended Course Goals. By the end of the semester, students will be able to: 1. Describe the types and limitations of firewall protection and be able to determine the best hardware and software selections for effective protection. 2. Develop a security policy that defines the responses to security violations and that also reflect an organization s overall security approach. 3. Identify different firewall configuration strategies based on the needs and desired security level of an organization. 4. Configure firewall software and hardware to authenticate and identify users and encrypt data. 5. List the components and essential operations of Virtual Private Networks (VPNs) and create VPN setups such as mesh or hub-and-spoke configurations. 6. Develop an Intrusion Detection System (IDS) and describe appropriate filter rules. Course Competencies and Objectives Competency 1 Explain the basic concepts of network security Objective 1.1 Define the TCP/IP networking design Objective 1.2 Describe the threats to network security Objective 1.3 Explain the goals of network security Objective 1.3 Describe a layered approach to network defense Competency 2 Describe the fundamental concepts and different approaches in analyzing risk analysis Objective 2.1 Explain the process of risk analysis Objective 2.2 Describe the recommended techniques to minimize risk Objective 2.3 Develop a security policy that addresses how an organization should respond to
4 an attach and the procedure for employees to safely handle data and resources Competency 3 Formulate a security policy and identify security policy procedures Objective 3.1 Explain best practices in security policies including gathering support from every level in the company and keeping these policies current Objective 3.2 Explain the importance of ongoing risk analysis and define incident-handling Objective 3.3 Describe the components of conducting risk assessments and security reviews Competency 4 Analyze network traffic signatures as they relate to suspicious events Objective 4.1 Describe the concepts of signature analysis Objective 4.2 Detect normal and suspicious traffic signatures Objective 4.3 Explain the Common Vulnerabilities and Exposures (CVE) standard Competency 5 Explain basic Virtual Private Network (VPN ) concepts Objective 5.1 Define encapsulation, encryption, and authentication in VPNs Objective 5.2 Summarize the advantages and disadvantages of VPNs Objective 5.3 Discuss the rationale for developing a VPN in a business including convenience and cost effectiveness as compared to the higher security risks of such a system Competency 6 Implement a VPN Objective 6.1 Describe the steps and software necessary to configure a VPN with and without firewalls Objective 6.2 Construct packet-filtering rules for VPNs Objective 6.3 Develop appropriate guidelines for auditing VPNs and VPN policies Competency 7 Identify the components of an Intrusion Detection System (IDS) Objective 7.1 List the appropriate steps of detecting unauthorized access to a networked system including : gathering data, sending alert messages, and automatic responses from an IDS system Objective 7.2 Describe options for implementing intrusion detection systems Objective 7.3 Evaluate different types of IDS products Competency 8 Configure an IDS and create filter rules Objective 8.1 Construct a security incident response team or contact person for your organization Objective 8.2 Explain the six-step incident response process Objective 8.3 Describe the recommended procedure in responding to false alarms to reduce reoccurrences Competency 9 Evaluate firewall hardware and software options Objective 9.1 List the functions of a firewalls Objective 9.2 Create a set of rules and restrictions for a firewall Objective 9.3 Compare the reliability, costs, and difficulty of implementation of various hardware and software firewalls Competency 10 Describe the requirements for securing network perimeters Objective 10.1 Define a bastion host and its function as a gateway between an inside and an outside network Objective 10.2 Explain how to supplement a firewall with a proxy server Objective 10.3 List the considerations necessary when deciding what type of authentication to use: user, session, or client Competency 11 Describe the recommended procedures in firewall management to improve security of digital information Objective 11.1 Manage firewalls to improve security Objective 11.2 Describe the types of log files that most of the firewalls offer, including: security, system, traffic, active, and audit logs Objective 11.3 Explain the parameters needed when choosing a firewall computer including the processor speed, amount of available Random Access Memory (RAM), and cache storage Competency 12 Develop procedures to manage and improve information security Objective 12.1 Compare the advantages and disadvantages of centralized data collection Objective 12.2 Describe the events that you need to monitor, including: logins, creation of
5 user accounts and groups, correct handling of attachments, backups, and antivirus scanning and control Objective 12.3 Describe the steps for training your security personnel to respond to security incidents and the importance of keeping informed of industry trends and innovations in the security field Teacher s Guide Course Textbook, Materials and Equipment Textbook(s) Title Guide to Firewalls and VPNs, 3rd Edition or most recent edition Author(s) Weaver Publisher Course Technology 2011 ISBN Software/ Equipment Textbook Costs Title Author(s) Publisher ISBN Please indicate how much the textbook would cost if purchased through Barnes & Noble: $ Modality X On-ground X On-line Course Assessments Description of Possible Course Assessments (Essays, multiple choice, etc.) Exams standardized for this course? Midterm Final Other (Please specify): Are exams required by the department? Yes _X No If Yes, please specify: Where can faculty members locate or access the required standardized exams for this course? (Contact Person and Location) Example: NCK Academic Chair Office Student Outcomes: Identify the general education goals for student learning that is a component of this course. Check all that apply: 1. Communicate effectively. a. Read and comprehend at a college level. b. Write effectively in a college setting. 2. Demonstrate effective quantitative reasoning and Method of Assessment Develop a security policy plan for distribution to all employees in an organization.
6 problem solving skills. 3. Demonstrate effective qualitative reasoning skills. Evaluate security options for effectiveness and costs to prevent loss of information data. 4. Apply effective methods of inquiry. a. Generate research paper by gathering information from varied sources, analyzing data and organizing information into a coherent structure. b. Employ the scientific method. 5. Demonstrate sensitivity to diversity a. Experience the creative products of humanity. b. Describe alternate historical, cultural, global perspectives.
CIS 253. Network Security
CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum
CIS 270. Systems Analysis and Design
CIS 270 Systems Analysis and Design Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to
MEA 116. Electronic Medical Records. Course Package
MEA 116 Electronic Medical Records Course Package Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue
PAR 201. Legal Research and Writing II. Course Package
PAR 201 Legal Research and Writing II Course Package Approved November 5, 2010 Effective Spring 2011 COURSE PACKAGE FORM Team Leader and Members Date of proposal to Curriculum Sub-committee: Candace Hofstadler
MEA 141. Medical Billing. Course Package
MEA 141 Medical Billing Course Package Approved: December 3, 2010 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue Date of proposal
CIS 241 INTRODUCTION TO E-COMMERCE
CIS 241 INTRODUCTION TO E-COMMERCE APPROVED 11/09/2011 EFFECTIVE FALL 2012-13 Prefix & Number CIS 241 Course Title: E-Commerce Technology Purpose of this submission: New Change/Updated Retire If this is
MEA 130 MEDICAL CODING I (ICD-10-CM)
MEA 130 MEDICAL CODING I (ICD-10-CM) PRESENTED FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 130 Course Title: Medical Coding I ICD-10-CM Purpose of this submission: New Change/Updated Retire
CHD 246 CO-OCCURRING DISORDERS
CHD 246 CO-OCCURRING DISORDERS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 246 Course Title: Co-Occurring Disorders Purpose of this submission: New Change/Updated
CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT
CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 270 Course Title: Clinical Strategies in Substance Abuse Treatment
CIS 280. Computer Information Systems Internship. Course Package
1 CIS 280 Computer Information Systems Internship Course Package Approved August 6, 2009 2 COURSE PACKAGE FORM Contact person(s) Andra Goldberg & Matt Butcher Date of proposal to Fall 2009 Curriculum Committee
BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS
BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUE130 Course Title: Financial Management for Entrepreneurs Purpose of this submission:
ASE 133 AUTO HVAC SYSTEMS
ASE 133 AUTO HVAC SYSTEMS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number ASE 133 Course : Auto HVAC Systems Purpose of this submission: New Change/Updated Retire If this
MEA 110 ADMINISTRATIVE MEDICAL ASSISTING
MEA 110 ADMINISTRATIVE MEDICAL ASSISTING PRESENTED: FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 110 Course Title: Administrative Medical Assisting Purpose of this submission: New Change/Updated
BUS 221 FINANCIAL ACCOUNTING
BUS 221 FINANCIAL ACCOUNTING PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number BUS 221 Course Title: Financial Accounting Purpose of this submission: New X Change/Updated Retire
ENG 136 TECHNICAL PROFESSIONAL WRITING
ENG 136 TECHNICAL PROFESSIONAL WRITING PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE - FALL 2012-13 Prefix & Number ENG 136 Course Title: Technical/Professional Writing Purpose of this submission: Update
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
BUS 204 BUSINESS COMMUNICATIONS
BUS 204 BUSINESS COMMUNICATIONS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUS 204 Course Title: Business Communications Purpose of this submission: New Change/Updated
ACC 135. Course Package
1 ACC 135 Accounting Systems and Procedures Course Package Approved August 6, 2009 2. COURSE PACKAGE FORM Contact person(s) Dr. Eric Aurand, Dr. James Childe Date of proposal to Fall 2009 Curriculum Committee
AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE
AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE Presented and Approved: December 7, 2012 Effective: Fall 2013-14 Prefix & Number AJS 101 Course Title: Introduction to Administration of Justice Purpose
DAE 115. Office Management for the Dental Assistant. Course Package
DAE 115 Office Management for the Dental Assistant Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee: Kathleen R. Baleno February
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
HVA 120 RESIDENTIAL HVAC INSTALLATION
HVA 120 RESIDENTIAL HVAC INSTALLATION PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number HVA 120 Course Title: Residential HVAC Installation Purpose of this submission: New
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14. MCC Form EDU 0007 (rev.
AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number AJS 225 Purpose of this submission: To update format, add Writing Across the Curriculum component, and
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Network Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
Commercial/Industrial Electricity
1 ELC 210 Commercial/Industrial Electricity Course Package Presented and Approved July 31, 2008 2 Contact person(s) DAVE WHITE Date of proposal to JULY 31, 2008 Curriculum Committee NEW COURSE PACKAGE
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Physical Development for Preschool, Toddlers and Their Parents
CDA 102A Physical Development Course Package/Modification/Retirement NEW Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee:
BIO 201 ANATOMY AND PHYSIOLOGY I with LAB
BIO 201 ANATOMY AND PHYSIOLOGY I with LAB (Title change ONLY Oct. 2013) Presented and Approved: January 12, 2012 Effective: 2012-13 FA Prefix & Number BIO 201 Course Title: Anatomy and Physiology I Purpose
New York City College of Technology Computer Systems Technology Department
New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?
What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
NAP 117 MEDICATION ASSISTANT COURSE
NAP 117 MEDICATION ASSISTANT COURSE APPROVED: JANUARY 12, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number NAP 117 Course Title: Medication Assistant Course Purpose of this submission: New Course New Change/Updated
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Course Title: ITAP 3471: Web Server Management
Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques
Firewall Architectures of E-Commerce
Firewall Architectures of E-Commerce EE657 Midterm Project Presentation Professor Hwang Andy Yan Four State-of-the-art Firewall Architectures Description of 4 solutions IBM enetwork Compaq AXENT s Raptor
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Effective Fall 2016 New Course Proposal CMN 3020, Public Relations Research, Evaluation, and Measurement. 2. Course prefix and number: CMN 3020
Agenda Item #15-137 Eastern Illinois University Effective Fall 2016 New Course Proposal CMN 3020, Public Relations Research, Evaluation, and Measurement Banner/Catalog Information (Coversheet) 1. New Course
ICAB5238B Build a highly secure firewall
ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Fireware Essentials Exam Study Guide
Fireware Essentials Exam Study Guide The Fireware Essentials exam tests your knowledge of how to configure, manage, and monitor a WatchGuard Firebox that runs Fireware OS. This exam is appropriate for
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and
UVic Department of Electrical and Computer Engineering
UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
CNA 432/532 OSI Layers Security
CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: [email protected] Office Hrs: 3-4 MW, Office: ECC256 Other
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Eastern Illinois University Revised Course Proposal BUS 2710, Survey of Finance
Eastern Illinois University Revised Course Proposal BUS 2710, Survey of Finance Agenda Item #15-71 Effective Summer 2015 Banner/Catalog Information (Coversheet) 1. New Course or X Revision of Existing
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
FIREWALL POLICY November 2006 TNS POL - 008
FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.
PR11 - Log Review Procedure Document Reference PR11 - Log Review Procedure Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 12 January 2010 - Initial release. 1.1 14 September
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology
COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date
COURSE SYLLABUS FIREWALLS & NETWORK SECURITY ITSY-2301 Number 2-3-3 Lecture - Lab - Credit ITSY-1342 Prerequisites April 16, 2015 Revision This syllabus has been reviewed and is current on the date indicated.
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002)
KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002) Course Number/Program Name ACS 7420 Algorithm Design for Big Data Department Computer Science Degree Title (if applicable)
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080
COURSE SYLLABUS Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd, Fairfield,
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
