Network Security ITP 457 (4 Units)

Similar documents
Advanced Digital Forensics ITP 475 (4 Units)

Security and Computer Forensics ITP 477 (4 Units)

Introduction to Computer Forensics ITP 499 (3 Units)

Introduction to Information Technology ITP 101x (4 Units)

Macintosh, OSX, & ios Forensics ITP 445 (3 Units)

Technologies for Interactive Marketing ITP499 (4 Units)

DESIGN FOR USER EXPERIENCE (ITP 310)

Data Warehouses and Business Intelligence ITP 487 (3 Units) Fall Objective

Social Games Workshop ITP499 (3 Units) Spring 2010 (2010-1)

ITP 300: Database Web Development. Database Web Development (Monday section) Fall 2012 Course Units

Enterprise Information Systems ITP 320x (4 Units)

Computer and Network Forensics INF 528 (3 Units)

Introduction to Cloud Technologies ITP 111x (2 Units)

3D Modeling, Animation, and Special Effects ITP 215x (2 Units)

3D Modeling, Animation, Compositing, and Special Effects ITP 215x (2 Units)

Mobile App Project ITP 442x (4 Units)

CIS 4204 Ethical Hacking Fall, 2014

CE 460 Course Syllabus

Mobile Application Technologies ITP 140 (2 Units)

CE 460 Course Syllabus

Mobile Application Development ITP 342 (3 Units)

Mobile App Design ITP 340x (3 Units)

Mobile Application Development ITP 342 (3 Units)

Multiplayer Game Programming ITP 484x (4 Units)

Mobile Application Development ITP 342 (3 Units)

Interactive Web Development ITP 301 (4 Units)

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CS 464/564 Networked Systems Security SYLLABUS

Database Web Development ITP 300 (3 Units)

CSC 474 Information Systems Security

CS Ethical Hacking Spring 2016

Video Game Programming ITP 380 (4 Units)

SAMPLE ONLY. COMM 304 Interpersonal Communication Spring 2015 Tu/Th 11:00 12:20 ANN L101

PROJECT MANAGEMENT DSO 580 Fall 2014

Summer 2015 Course Title & credit hours: Information Security, CET2830C (hybrid); 3 credit hours

INF 203: Introduction to Network Systems (3 credit hours) Spring W1, Class number 9870

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

UVic Department of Electrical and Computer Engineering

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

ECON 351: Microeconomics for Business

GESM 160 Seminar in Quantitative Reasoning Wireless Computing Technologies for Medicine with Legal and Ethical Implications.

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

Tentative: Subject to Change CHEM 205Lxg Chemical Forensics: the Science, and its Impact. Course Overview:

IOM433 Creative Information Systems Analysis and Design Spring 2006 T/Th 2-3:50 HOH406 (Labs meet in HOH401)

Please see the course lecture plan (at the end of this syllabus) for more detailed information on the topics covered and course requirements.

Fundamentals of Computer Programming CS 101 (3 Units)

WBIT Human Computer Interaction. Course Syllabus

Web-Based Database Applications ITP 300x (3 Units)

Technologies and Processes for Building Web Startups ITP 499 (4 Units)

Certified Ethical Hacker (CEH)

Ecommerce Designing ETP 450x (4 Units) - Laboratory Exercises

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

BUAD 310 Applied Business Statistics. Syllabus Fall 2013

Windows Server 2008: Server Administration (ITMT 2351)

Introduction to Psychology 100 On-Campus Fall 2014 Syllabus

Introduction to Computer Forensics Course Syllabus Spring 2012

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

ACCT 5020 Accumulation / Analysis of Accounting Data Class Syllabus Spring 2015 Eight Week Format March 23 May 15, 2015

PSY 350 ABNORMAL PSYCHOLOGY SPRING 2011

CIT 212 Microsoft Networking II Windows Server 2012 R2 Administration Fall 2015

Course Title: ITAP 3471: Web Server Management

Introduction to Java Programming ITP 109 (2 Units) Fall 2015

CNA 432/532 OSI Layers Security

LaGuardia Community College City University of New York Social Science Department General Psychology: SSY

Network Security Course Specifications

Installing and Configuring Windows Server 2012 (ITNW 1301)

The objectives of the course are to provide students with a solid foundation in all aspects of internet marketing. Specifically my goals are:

Introduction to Public Relations MCM Course Syllabus Spring 2011 Division of Communication and Contemporary Culture

Applied Network Security Course Syllabus Spring 2015

Introduction to Management Information Systems MGMT 221 In-Person Lecture (PL) Course Syllabus

CIT215 - Microsoft Networking V Spring 2015

Department of Geography Program in Planning, Faculty of Arts and Science University of Toronto GGR 273 H1S: GIS II Course Outline Winter 2015

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona

CIT 217 Security + Network Security Fall 2015

University of Southern California Marshall School of Business Administration Management and Organization Dept. MOR NEGOTIATION and PERSUASION

Psychology 314L (52510): Research Methods

Building the High Tech Startup ITP 499x (4 Units)

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Design and Configuration of a Network Security and Forensics Lab

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CPSC 4550 Computer Networks Fall 2012, Section 0

ISE 515: Engineering Project Management

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Psychological Testing (PSYCH 149) Syllabus

CSCI-599 DATA MINING AND STATISTICAL INFERENCE

Rutgers University, Department of Psychology Developmental Psychology Winter Office Hours Office Phone

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

User Security Education and System Hardening

etroy Abnormal Psychology 3304 TERM 1, 2015

SCHOOL OF JOURNALISM USC ANNENBERG SCHOOL FOR COMMUNICATION AND JOURNALISM. Journalism 463: Research, Analysis and Insight Spring Units

IOM431:Foundations of Digital Business Innovation

IML 140: Workshop in Multimedia Authoring

Cover Sheet: Request 9958

Transcription:

Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet and decentralization of information, computers are more vulnerable to break-ins than ever before. Nearly every computer today is connected to a network, and these networks are in turn connected to a giant network known as the internet. Computers are no longer inherently safe, and this course is designed to have students understand the risks and learn the best practices to securing systems and networks. The course begins with an introduction to networking and networking topologies. Students then move on to the basics of security. The course then moves on to an introduction to ethical hacking, with the mindset that the easiest way to test the security of the system is to try to break it yourself. The course then moves on to securing the network from the inside out, starting with the workstations and private servers, and moving out to the perimeter and public facing servers. The course culminates with a final project in which the students design and submit a proposal for a secure network for a small business. Upon completing this course, students will understand: - The fundamentals of network security - Methods to secure Windows and Linux servers and workstations - Network security and vulnerability assessment - Security policy and the big picture ITP 357 Joseph Greenfield joseph.greenfield@usc.edu 213-740-4604 4 hrs/week Hacking Exposed Network Security Secrets & Solutions, Fifth Edition. McClure, Scambray, and Kurtz. McGraw Hill/Osbourne 2005 ISBN: 0-07-226081-5 All course material will be on Blackboard at blackboard.usc.edu

Grading Grading Scale Grading will be based on a certain percentage earned. Students will have labs to work on throughout the semester. In addition, students will have a midterm exam and a final semester project. The grade breakdown is as follows: Projects/Labs 45% Midterm 15% Final Project 30% Class Participation 10% Total 100% The following is the grading scale to be used for the final grades at the end of the semester 93% and above A 90% 93% A- 87% 90% B+ 83% 87% B 80% 83% B- 77% 80% C+ 73% - 77% C 70% 73% C- 67% 70% D+ 63% 67% D 60% 63% D- Below 60% F Policies - Projects turned in after the deadline will automatically have 5% deducted per day. Projects will not be accepted after 1 week beyond the project s deadline - No make-up exams (except for medical or family emergencies) will be offered nor will there be any changes made to the Final Exam schedule. - It is your responsibility to submit your project on or before the due date. It is not the responsibility of the lab assistant. Do not turn in anything to your lab assistant! - Always keep a backup copy of your projects Academic Integrity The use of unauthorized material, communication with fellow students during an examination, attempting to benefit from the work of another student, and similar behavior that defeats the intent of an examination or other class work is unacceptable to the University. It is often difficult to distinguish between a culpable act and inadvertent behaviour resulting from the nervous tension accompanying examinations. When the professor determines that a violation has occurred, appropriate action, as - 2 -

determined by the instructor, will be taken. Although working together is encouraged, all work claimed as yours must in fact be your own effort. Students who plagiarize the work of other students will receive zero points and possibly be referred to Student Judicial Affairs and Community Standards (SJACS). Students with Disabilities All students should read, understand, and abide by the University Student Conduct Code listed in SCampus, and available at: http://www.usc.edu/student-affairs/sjacs/nonacademicreview.html Any student requesting academic accommodations based on a disability is required to register with Disability Services and Programs (DSP) each semester. A letter of verification for approved accommodations can be obtained from DSP. Please be sure the letter is delivered to me (or to your TA) as early in the semester as possible. DSP is located in STU 301 and is open 8:30 a.m. - 5:00 p.m., Monday through Friday. The phone number for DSP is (213) 740-0776. - 3 -

Network Security ITP 457 (4 Units) Course Outline Week 1 Introduction to Network Security - Course overview - Hackers & Hacker mentality - Networking Basics - Network Topologies Week 2 Network Technologies Review Week 3 Ethical Hacking I Week 4 Ethical hacking II Week 5 Authentication - OSI Model - TCP - IP - UDP - NAT - Network Footprinting - Introduction to hacking Reading: Chapter 1 Project: Lab 1 - Portscanning - Identifying vulnerabilities in Windows systems - Exploiting vulnerabilities in Windows systems - Hacker mindset Reading: Chapters 2 & 3 Project: Lab 2 Windows compromise - Authentication schemes - Basic cryptography - Passwords Project: Lab 3 Password cracking using rainbow tables - 4 -

Week 6 War Games Week 7 MIDTERM - Team hacking project, demonstrating the need for security Project: Lab 4 War Games Week 8 Workstation security - Identifying risks with windows workstations - Windows 2000 vs. XP vs. Vista - Unix workstation security - Basic instruction for securing workstations Reading: Chapter 4 Project: Lab 5 Securing Windows workstations Week 9 Windows server security & enterprise networks - Active Directory and server roles - DNS - File servers - Risk assessment Reading: Chapter 7 Project: Lab 6 Deploying Active Directory & maintaining enterprise networks Week 10 Vulnerability Assessment - Automated tools for vulnerability assessment - Good, bad, and ugly of automated tools - Introduction to Nessus Project: Lab 7 Nessus & vulnerability assessment Week 11 Network Perimeter: Firewalls - Introduction to network perimeter devices - Firewalls: where and how? - Network firewalls vs. personal firewalls Reading: Chapter 9 Project: Lab 8 Firewalls & iptable rules Week 12 Network Perimeter: intrusion detection systems - What is an IDS - How is it useful? - How can it kill me? Reading: Handouts Project: FINAL PROJECT ASSIGNED - 5 -

Week 13 Security Policy - Integrating security and management - Writing security policies - Risk assessment and prevention policies Week 14 The Human Element - Social Engineering 101 - Training personnel about security - Interviewing and Interrogating Week 15 Final Project progress - Feedback on student progress - Further enhancements Week 16 Final project presentations - Student presentations - Class conclusion - 6 -