Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet and decentralization of information, computers are more vulnerable to break-ins than ever before. Nearly every computer today is connected to a network, and these networks are in turn connected to a giant network known as the internet. Computers are no longer inherently safe, and this course is designed to have students understand the risks and learn the best practices to securing systems and networks. The course begins with an introduction to networking and networking topologies. Students then move on to the basics of security. The course then moves on to an introduction to ethical hacking, with the mindset that the easiest way to test the security of the system is to try to break it yourself. The course then moves on to securing the network from the inside out, starting with the workstations and private servers, and moving out to the perimeter and public facing servers. The course culminates with a final project in which the students design and submit a proposal for a secure network for a small business. Upon completing this course, students will understand: - The fundamentals of network security - Methods to secure Windows and Linux servers and workstations - Network security and vulnerability assessment - Security policy and the big picture ITP 357 Joseph Greenfield joseph.greenfield@usc.edu 213-740-4604 4 hrs/week Hacking Exposed Network Security Secrets & Solutions, Fifth Edition. McClure, Scambray, and Kurtz. McGraw Hill/Osbourne 2005 ISBN: 0-07-226081-5 All course material will be on Blackboard at blackboard.usc.edu
Grading Grading Scale Grading will be based on a certain percentage earned. Students will have labs to work on throughout the semester. In addition, students will have a midterm exam and a final semester project. The grade breakdown is as follows: Projects/Labs 45% Midterm 15% Final Project 30% Class Participation 10% Total 100% The following is the grading scale to be used for the final grades at the end of the semester 93% and above A 90% 93% A- 87% 90% B+ 83% 87% B 80% 83% B- 77% 80% C+ 73% - 77% C 70% 73% C- 67% 70% D+ 63% 67% D 60% 63% D- Below 60% F Policies - Projects turned in after the deadline will automatically have 5% deducted per day. Projects will not be accepted after 1 week beyond the project s deadline - No make-up exams (except for medical or family emergencies) will be offered nor will there be any changes made to the Final Exam schedule. - It is your responsibility to submit your project on or before the due date. It is not the responsibility of the lab assistant. Do not turn in anything to your lab assistant! - Always keep a backup copy of your projects Academic Integrity The use of unauthorized material, communication with fellow students during an examination, attempting to benefit from the work of another student, and similar behavior that defeats the intent of an examination or other class work is unacceptable to the University. It is often difficult to distinguish between a culpable act and inadvertent behaviour resulting from the nervous tension accompanying examinations. When the professor determines that a violation has occurred, appropriate action, as - 2 -
determined by the instructor, will be taken. Although working together is encouraged, all work claimed as yours must in fact be your own effort. Students who plagiarize the work of other students will receive zero points and possibly be referred to Student Judicial Affairs and Community Standards (SJACS). Students with Disabilities All students should read, understand, and abide by the University Student Conduct Code listed in SCampus, and available at: http://www.usc.edu/student-affairs/sjacs/nonacademicreview.html Any student requesting academic accommodations based on a disability is required to register with Disability Services and Programs (DSP) each semester. A letter of verification for approved accommodations can be obtained from DSP. Please be sure the letter is delivered to me (or to your TA) as early in the semester as possible. DSP is located in STU 301 and is open 8:30 a.m. - 5:00 p.m., Monday through Friday. The phone number for DSP is (213) 740-0776. - 3 -
Network Security ITP 457 (4 Units) Course Outline Week 1 Introduction to Network Security - Course overview - Hackers & Hacker mentality - Networking Basics - Network Topologies Week 2 Network Technologies Review Week 3 Ethical Hacking I Week 4 Ethical hacking II Week 5 Authentication - OSI Model - TCP - IP - UDP - NAT - Network Footprinting - Introduction to hacking Reading: Chapter 1 Project: Lab 1 - Portscanning - Identifying vulnerabilities in Windows systems - Exploiting vulnerabilities in Windows systems - Hacker mindset Reading: Chapters 2 & 3 Project: Lab 2 Windows compromise - Authentication schemes - Basic cryptography - Passwords Project: Lab 3 Password cracking using rainbow tables - 4 -
Week 6 War Games Week 7 MIDTERM - Team hacking project, demonstrating the need for security Project: Lab 4 War Games Week 8 Workstation security - Identifying risks with windows workstations - Windows 2000 vs. XP vs. Vista - Unix workstation security - Basic instruction for securing workstations Reading: Chapter 4 Project: Lab 5 Securing Windows workstations Week 9 Windows server security & enterprise networks - Active Directory and server roles - DNS - File servers - Risk assessment Reading: Chapter 7 Project: Lab 6 Deploying Active Directory & maintaining enterprise networks Week 10 Vulnerability Assessment - Automated tools for vulnerability assessment - Good, bad, and ugly of automated tools - Introduction to Nessus Project: Lab 7 Nessus & vulnerability assessment Week 11 Network Perimeter: Firewalls - Introduction to network perimeter devices - Firewalls: where and how? - Network firewalls vs. personal firewalls Reading: Chapter 9 Project: Lab 8 Firewalls & iptable rules Week 12 Network Perimeter: intrusion detection systems - What is an IDS - How is it useful? - How can it kill me? Reading: Handouts Project: FINAL PROJECT ASSIGNED - 5 -
Week 13 Security Policy - Integrating security and management - Writing security policies - Risk assessment and prevention policies Week 14 The Human Element - Social Engineering 101 - Training personnel about security - Interviewing and Interrogating Week 15 Final Project progress - Feedback on student progress - Further enhancements Week 16 Final project presentations - Student presentations - Class conclusion - 6 -