NETWORK SECURITY (W/LAB) Course Syllabus



Similar documents
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Network Access Security. Lesson 10

CYBER FORENSICS (W/LAB) Course Syllabus

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Security Technology: Firewalls and VPNs

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Networking: EC Council Network Security Administrator NSA

Linux Network Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Security + Certification (ITSY 1076) Syllabus

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Network Security and Firewall 1

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Network Security Administrator

Implementing Cisco IOS Network Security v2.0 (IINS)

Internet Security Firewalls

CIS 156. Firewalls and Intrusion Detection

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Security. TestOut Modules

Developing Network Security Strategies

Chapter 9 Firewalls and Intrusion Prevention Systems

Cisco Which VPN Solution is Right for You?

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Securing Cisco Network Devices (SND)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

21.4 Network Address Translation (NAT) NAT concept

The next generation of knowledge and expertise Wireless Security Basics

Computer Network Engineering

Network System Design Lesson Objectives

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

How To Pass The Information And Network Security Certificate

Solution of Exercise Sheet 5

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Cisco Certified Security Professional (CCSP)

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Course Title: Penetration Testing: Security Analysis

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Pre-lab and In-class Laboratory Exercise 10 (L10)

Chapter 15. Firewalls, IDS and IPS

Introduction to Cyber Security / Information Security

Network Defense Tools

Internet Security Firewalls

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Virtual Private Networks

Introduction of Intrusion Detection Systems

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

How To Pass A Credit Course At Florida State College At Jacksonville

Post-Class Quiz: Telecommunication & Network Security Domain

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

VPN. Date: 4/15/2004 By: Heena Patel

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Computer Network Engineering

Guideline on Firewall

Computer Security: Principles and Practice

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Description: Objective: Attending students will learn:

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Computer Security DD2395

Chapter 1 Network Security

INTRUSION DETECTION SYSTEMS and Network Security

Firewalls (IPTABLES)

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Network Security. Lecture 3

Overview. Firewall Security. Perimeter Security Devices. Routers

Securing Networks with PIX and ASA

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

How To Protect Your Network From Attack

"Charting the Course...

Computer Networks. Secure Systems

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Secure SCADA Network Technology and Methods

How To Learn Cisco Cisco Ios And Cisco Vlan

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Galileo International. Firewall & Proxy Specifications

SonicWALL PCI 1.1 Implementation Guide

Transcription:

6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information Technology Career Pathway: Network Systems Career Major(s): Cyber Security Forensics Specialist Pre-requisite(s): Course Description: Principles of Information Assurance Students will learn about network communications from a security standpoint and perform laboratory assignments in securing networks and operating systems. Textbooks: Security + Guide to Network Security Fundamentals, 4 th Ed, by Mark Ciampa, Course Technology- Cengage Learning (2012) Lab Manuel for Security + Guide to Network Security Fundamentals, 4 th Ed, By Dean Farwood, Course Technology Cengage Learning (2012) Course 1. Network Defense Fundamentals: In this topic, students are introduced to the core concepts of network security. Network defense technologies are examined, with particular emphasis given to the creation of a layered and diversified defense-in-depth architecture that begins with a security policy defining each layer. Students also identify the foundations of network auditing. a. Describe the five keys of network security. b. Identify and explain the concepts, policies, and technologies associated with a layered and diversified defense-in-depth strategy. c. Discuss the objectives of access control methods and describe how the available methods are implemented in the defense of a network. d. Identify the impact of a layered defense on the performance of the network. e. Define the concepts of auditing in a network, including the types of audits and the handling of data. 2. Advanced TCP/IP: In this topic, students examine the primary set of protocols that run networks and the Internet today, the Transmission Control Protocol (TCP) and Internet Protocol (IP) suite. Students become familiar with the details of how TCP/IP functions, including core concepts such as addressing and subnetting, and advanced concepts such as session establishment and packet analysis. a. Define the core concepts of TCP/IP, including model layers, RFCs, addressing and subnetting, VLSM and CIDR, and the TCP/IP protocol suite. b. Utilize a protocol analyzer to examine all the fields of IP, ICMP, TCP, and UDP. c. Examine TCP sessions, including the use of control flags, and sequence and acknowledgement numbers in the three-way handshake and session teardowns. d. View and analyze network traffic fragmentation. Revised: 01/14/2015 Page 1 of 8

e. Utilize a protocol analyzer to observe and analyze a complete FTP session, frame by frame. 3. Routers and Access Control Lists: In this topic, students are introduced to the functioning of routers and routing protocols. Students examine the issues related to securing both routers and routing protocols, including the removal of unnecessary services, creation of access control lists, and configuration of logging to manage and secure the network. a. Configure fundamental router security, including the use of banners and the SSH protocol. b. Examine the principles of routing by capturing and analyzing routing protocol packets, and observing the IP and MAC address relationships in a routed environment. c. Create configurations to harden the core services and protocols on a Cisco router. d. Configure and examine the function of Access Control Lists on a Cisco router that defends against network attacks. e. Create the required configurations to enable logging on a Cisco router. 4. Designing Firewalls: In this topic, students are introduced to the concepts and technologies used in designing firewall systems. Students will identify the methods of implementing firewalls in different scenarios, using different technologies. a. Examine the principles of firewall design and implementation. b. Construct a firewall policy based on stated requirements. c. Create a rule set for a packet filtering firewall. d. Describe the function and processes of a proxy server. e. Define bastion host and explain its purpose with respect to network security. f. Define honeypot and describe its function in the security of the network. 5. Configuring Firewalls: In this topic, students examine firewalls from a conceptual viewpoint to learn about the types of firewalls, how each of these types work, and what protection they can provide for the network. Students then apply this knowledge, utilizing Microsoft s Internet Security and Acceleration server and Linux IPTables. a. Describe standard firewall functionality and common implementation practices. b. Install, configure, and monitor Microsoft ISA Server 2006, while exploring management, monitoring, and auditing options. c. Examine the concepts of IPTables, including a review of sample rule chains controlling the egress and ingress of specific network traffic. d. Apply firewall concepts and knowledge by designing a firewall topology and rule sets to create the required firewall security posture for a specific network situation. 6. Implementing IPSec and VPNs: In this topic, students examine Virtual Private Networks (VPNs) and the security issues related to them. Students are introduced to the concepts of IPSec, then examine and configure the Microsoft Management Console (MMC) and identify the predefined IPSec policies in Windows Server 2003. Students create new policies and implement IPSec to specifically use AH, ESP, or both, in Transport Mode. IPSec traffic is analyzed using a protocol analyzer. a. Define the function of IPSec in a networked environment. b. Examine IPSec policy management. c. Implement and examine IPSec AH configurations. d. Implement and examine IPSec AH and ESP configurations. e. Analyze the IPSec structure, cryptography, the Encapsulating Security Payload, the Authentication Header, the Internet Key Exchange, and modes of Revised: 01/14/2015 Page 2 of 8

implementation on a running network. f. Examine the business drivers and technology components for a VPN. g. Examine the concepts of IPSec and other tunneling protocols, including Pointto-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). h. Analyze secure VPN design and implementation issues. i. Examine the issues of VPN and firewall architecture and VPN authentication. j. Configure VPN options built into Windows 2003 Server. 7. Designing an Intrusion Detection System: In this topic, students are introduced to the concepts surrounding one of the critical areas to the defensive network protection scheme the Intrusion Detection System (IDS). This system, in conjunction with the firewall technologies in place, is the basis for a very solidly defended network. The IDS is used to detect when an intruder is attempting penetration of the network, or tampering with the firewalls. a. Examine the components of Intrusion Detection Systems and describe how these interact to accomplish the goals of intrusion detection. b. Describe the technologies and techniques of intrusion detection. c. Examine the process of intrusion detection and how behavioral use is implemented in the IDS. d. Compare and contrast host-based and network-based IDSs. e. Examine the principles of intrusion detection data analysis. f. Describe the methods of IDS usage for the detection of, monitoring of, and anticipation of attacks. g. Identify IDS limitations. 8. Configuring an IDS: In this topic, students implement an Intrusion Detection System known as Snort. Students use this installation to capture and monitor TCP/IP traffic and to create rule sets that identify suspicious traffic and direct network attacks. a. Describe how Snort works as an Intrusion Detection System, highlighting the pros and cons of its implementation in a production network environment. b. Install Snort on a stand-alone computer. c. Describe, create, and test a Snort rule set. d. Configure Snort to send alert data to a MySQL database. e. Use Snort to configure a complete Intrusion Detection System on a Linux system, including a MySQL database and the BASE Console to view alerts. 9. Securing Wireless Networks: In this topic, students learn to implement and secure a wireless network. Students examine wireless network components and configurations, and identify the security options required for making wireless networks part of a trusted enterprise. Wireless network analysis tools are used to audit wireless networks. a. Examine the fundamental issues, equipment, media, and systems of wireless networking. b. Describe the fundamentals of wireless local area networks, including their operations, IEEE 802.11 framing options, configuration essentials, and vulnerabilities. c. Implement and analyze wireless security solutions, including WEP, SSID broadcast disabling, MAC address filtering, and WPA. d. Utilize wireless tools, including AiroPeek NX and NetStumbler, to audit a wireless network. e. Describe the components and procedures required to implement a trusted wireless network. Revised: 01/14/2015 Page 3 of 8

10. Analyzing Packet Signatures: In this topic, students are introduced to the core concepts of analyzing network packets, including those that are designated as allowed and disallowed for use on a network. Students examine in detail both the headers and payload sections of several packet types. a. Describe the concepts of TCP/IP packet signature analysis. b. Examine the function and describe the benefits of the Common Vulnerabilities and Exposure (CVE) standard. c. Examine the concepts of signatures and their use in identifying multiple types of traffic as malicious. d. Identify, examine, and contrast normal and abnormal TCP/IP traffic signatures. 11. Transmission and TEMPEST Security: In this topic, students examine issues related to the interception of data signals and computer emissions. Students study methods for securing computer equipment from detectable emissions, and examine the TEMPEST program. a. Identify and describe how data signals may be intercepted. b. Identify and describe methods of securing computer equipment emissions. c. Examine the TEMPEST program. ODCTE Objectives TTC additional objectives for NS: A. Network Attack Techniques 1. Describe the threats to network security 2. Explain the goals of network security 3. Describe a layered approach to network defense 4. Explain how network security defenses affect your organization 5. Describe the five keys of network security. 6. Identify and explain the concepts, policies, and technologies associated with a layered and diversified defense-in-depth strategy. 7. Discuss the objectives of access control methods and describe how the available methods are implemented in the defense of a network. 8. Identify the impact of a layered defense on the performance of the network. 9. Define the concepts of auditing in a network, including the types of audits and the handling of data. B. Networks 1. Basic TCP/IP a. Explain the fundamentals of TCP/IP networking b. Describe IPv4 packet structure and explain packet fragmentation c. Describe Internet Protocol version 6 (IPv6) d. Differentiate between the different ports & protocols, their respective threats and mitigation techniques. 2. Advanced TCP/IP a. Define the core concepts of TCP/IP, including model layers, RFCs, addressing and subnetting, VLSM and CIDR, and the TCP/IP protocol suite. b. Utilize a protocol analyzer to examine all the fields of IP, ICMP, TCP, and UDP. Revised: 01/14/2015 Page 4 of 8

c. Examine TCP sessions, including the use of control flags, and sequence and acknowledgement numbers in the three-way handshake and session teardowns. d. View and analyze network traffic fragmentation. e. Utilize a protocol analyzer to observe and analyze a complete FTP session, frame by frame. C. Routers and Routing 1. Router Fundamentals a. Describe the basics of the routing process b. Explain how routers use routing protocols and describe common routing protocols c. Examine the principles of routing by capturing and analyzing routing protocol packets, and observing the IP and MAC address relationships in a routed environment. 2. Cisco Router Security a. Describe the use of access control lists on Cisco routers b. Explain the options for logging with Cisco routers c. Describe how basic Cisco authorization and authentication are configured d. Configure fundamental router security, including the use of banners and the SSH protocol. e. Create configurations to harden the core services and protocols on a Cisco router. f. Configure and examine the function of Access Control Lists on a Cisco router that defends against network attacks. g. Create the required configurations to enable logging on a Cisco router. D. Firewalls 1. Designing Firewalls a. Explain what firewalls can and cannot do b. Describe common approaches to packet filtering c. Compare hardware and software firewalls d. Explain how to supplement a firewall with a proxy server e. Describe factors in choosing a bastion host f. Define bastion host and explain its purpose with respect to network security. g. Set up Network Address Translation (NAT) h. Examine the principles of firewall design and implementation. i. Construct a firewall policy based on stated requirements. j. Describe the function and processes of a proxy server. 2. Configuring Firewalls a. Design common firewall configurations b. Create a rule set for a packet filtering firewall. c. Establish a set of rules and restrictions for a firewall d. Decide when to use user, session, or client authentication e. Describe standard firewall functionality and common implementation practices. f. Apply firewall concepts and knowledge by designing a firewall topology and rule sets to create the required firewall security posture for a specific network situation. 3. Managing Firewalls Revised: 01/14/2015 Page 5 of 8

a. Explain how to edit a rule base b. Describe how to manage log files c. List measures for improving firewall performance and security d. Explain how to install and configure Microsoft ISA Server 2006 e. Install, configure, and monitor Microsoft ISA Server 2006, while exploring management, monitoring, and auditing options. f. Explain how to manage and configure Iptables for Linux g. Examine the concepts of IPTables, including a review of sample rule chains controlling the egress and ingress of specific network traffic. E. Virtual Private Networks 1. Tunneling and Encryption Protocols a. Explain and implement protocols. b. SSL c. SSH d. Examine the concepts of IPSec and other tunneling protocols, including Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). 2. Designing VPNs a. Explain basic VPN concepts b. Describe encapsulation in VPNs c. Describe encryption in VPNs d. Describe authentication in VPNs e. Explain considerations for planning VPN deployments f. Describe options for VPN configurations g. Explain ways to adjust packet-filtering rules for VPNs h. Describe ways to review VPN policies and procedures i. Explain how to set up a VPN in Windows Server 2003 j. Examine the business drivers and technology components for a VPN. k. Analyze secure VPN design and implementation issues. l. Examine the issues of VPN and firewall architecture and VPN authentication. m. Configure VPN options built into Windows 2003 Server. 3. Implementing IPSec a. Define the function of IPSec in a networked environment. b. Examine IPSec policy management. c. Implement and examine IPSec AH configurations. d. Implement and examine IPSec AH and ESP configurations. e. Analyze the IPSec structure, cryptography, the Encapsulating Security Payload, the Authentication Header, the Internet Key Exchange, and modes of implementation on a running network. F. Intrusion Detection Systems 1. Designing IDSs a. Identify the components of an intrusion detection system b. Describe options for implementing intrusion detection systems c. Explain the steps of intrusion detection d. Examine the components of Intrusion Detection Systems and describe how these interact to accomplish the goals of intrusion detection. e. Describe the technologies and techniques of intrusion detection. f. Examine the process of intrusion detection and how behavioral use is implemented in the IDS. g. Compare and contrast host-based and network-based IDSs. h. Examine the principles of intrusion detection data analysis. Revised: 01/14/2015 Page 6 of 8

i. Describe the methods of IDS usage for the detection of, monitoring of, and anticipation of attacks. j. Identify IDS limitations. k. Define honeypot and describe its function in the security of the network. 2. Configuring IDSs a. Install and configure an intrusion detection system b. Explain considerations for setting up a security incident response team c. Describe the six-step incident response process d. Explain options for dealing with false positives and legitimate security alerts e. Use monitoring tools on systems and networks and detect securityrelated anomalies. f. Describe how Snort works as an Intrusion Detection System, highlighting the pros and cons of its implementation in a production network environment. g. Install Snort on a stand-alone computer. h. Describe, create, and test a Snort rule set. i. Configure Snort to send alert data to a MySQL database. j. Use Snort to configure a complete Intrusion Detection System on a Linux system, including a MySQL database and the BASE Console to view alerts. G. Wireless Transmissions 1. Designing Wireless Networks a. Explain wireless communication concepts b. Describe factors in wireless network design c. Wireless Communication Technology 2. Securing Wireless Networks a. Explain basic concepts in wireless security b. Describe security solutions for wireless networking c. Examine the fundamental issues, equipment, media, and systems of wireless networking. d. Describe the fundamentals of wireless local area networks, including their operations, IEEE 802.11 framing options, configuration essentials, and vulnerabilities. e. Implement and analyze wireless security solutions, including WEP, SSID broadcast disabling, MAC address filtering, and WPA. f. Utilize wireless tools, including AiroPeek NX and NetStumbler, to audit a wireless network. g. Describe the components and procedures required to implement a trusted wireless network. 3. Tranmission and TEMPEST Security a. Identify and describe how data signals may be intercepted. b. Identify and describe methods of securing computer equipment emissions. c. Examine the TEMPEST program. H. Analyzing Packet Signatures 1. Describe the concepts of TCP/IP packet signature analysis. 2. Examine the function and describe the benefits of the Common Vulnerabilities and Exposure (CVE) standard. 3. Examine the concepts of signatures and their use in identifying multiple types of traffic as malicious. 4. Identify, examine, and contrast normal and abnormal TCP/IP traffic signatures. Revised: 01/14/2015 Page 7 of 8

Teaching Methods: The class will primarily be taught by the lecture and demonstration method and supported by various media materials to address various learning styles. There will be question and answer sessions over material covered in lecture and media presentations. Supervised lab time is provided for students to complete required projects. Grading Procedures: 1. Students are graded on theory and shop practice and performance. 2. Each course must be passed with seventy (70%) percent or better. 3. Grading scale: A=90-100%, B=80-89%, C=70-79%, D=60-69%, F=50-59%. Description of Classroom, Laboratories, and Equipment: nology Center campuses are owned and operated by nology Center School District No. 18. All programs provide students the opportunity to work with professionally certified instructors in modern, well-equipped facilities. Available Certifications/ College Credit The student may be eligible to take state, national or industry exam after completion of the program. College credit may be issued from Oklahoma State University-Okmulgee, Rogers State University or Tulsa Community College. See program counselor for additional information. College Credit Eligibility: The student must maintain a grade point average of 2.0 or better. Revised: 01/14/2015 Page 8 of 8