How To Pass A Credit Course At Florida State College At Jacksonville



Similar documents
FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

CISCO IOS NETWORK SECURITY (IINS)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CCNP: Implementing Secure Converged Wide-area Networks

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security

Tim Bovles WILEY. Wiley Publishing, Inc.

(d-5273) CCIE Security v3.0 Written Exam Topics

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Network Access Security. Lesson 10

CCNA Security v1.0 Scope and Sequence

IINS Implementing Cisco Network Security 3.0 (IINS)

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

CCNA Security 2.0 Scope and Sequence

Cisco Certified Security Professional (CCSP)

"Charting the Course...

Remote Access Security

Chapter 1 The Principles of Auditing 1

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Computer Network Engineering

Associate in Science Degree in Computer Network Systems Engineering

Security + Certification (ITSY 1076) Syllabus

How To Learn Cisco Cisco Ios And Cisco Vlan

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120

ICANWK406A Install, configure and test network security

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Network Security Administrator

Cisco Certified Network Expert (CCNE)

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Executive Summary and Purpose

CTS2134 Introduction to Networking. Module Network Security

Cisco ASA. Administrators

Networking: EC Council Network Security Administrator NSA

FIREWALLS & CBAC. philip.heimer@hh.se

Cornerstones of Security

TABLE OF CONTENTS NETWORK SECURITY 2...1

Fundamentals of Network Security - Theory and Practice-

CCNA Security v1.0 Scope and Sequence

NETWORK SECURITY (W/LAB) Course Syllabus

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Chapter 4: Security of the architecture, and lower layer security (network security) 1

General Network Security

information security and its Describe what drives the need for information security.

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

How To Understand And Understand The Security Of A Key Infrastructure

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Security Technology: Firewalls and VPNs

Network Security and Firewall 1

SonicWALL PCI 1.1 Implementation Guide

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

ICTTEN8195B Evaluate and apply network security

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. Introduction to Programming with Visual Basic.NET

CCIE Security Written Exam ( ) version 4.0

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

BUY ONLINE FROM:

Network Security Fundamentals

Recommended IP Telephony Architecture

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Cisco Router and Security Device Manager (SDM)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Virtual Private Networks

RuggedCom Solutions for

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

A Model Design of Network Security for Private and Public Data Transmission

Introduction p. 2. Introduction to Information Security p. 1. Introduction

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Basics of Internet Security

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Securing Cisco Network Devices (SND)

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Firewall Environments. Name

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Site to Site Virtual Private Networks (VPNs):

VPN. Date: 4/15/2004 By: Heena Patel

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Common Remote Service Platform (crsp) Security Concept

Network Security Course Specifications

Eleventh Hour Security+

Transcription:

Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade of C or higher None CREDIT HOURS: 4 CONTACT HOURS/WEEK: 4 CONTACT HOUR BREAKDOWN: Lecture/Discussion: 3 Laboratory: 1 Other : FACULTY WORKLOAD POINTS: 4 STANDARDIZED CLASS SIZE 24 ALLOCATION: CATALOG COURSE DESCRIPTION: This course covers methods of securing SOHO and enterprise-class networks. Topics include teleworker configuration and access, xdsl, cable, employing AAA, encryption, Frame Relay MPLS, site-to-site VPN, remote VPN, strategies used to mitigate network attacks, router and switch hardening, and IOS firewall features. Handson exercises are an integral part of the course. Pre-requisites are CET 2610/CNT 2002 AND CET2615/CNT 2003 with grades of C or higher. SUGGESTED TEXT(S): CCNP ISCW Official Exam Certification Guide, Cisco Press (latest edition) IMPLEMENTATION DATE: Fall Term, 2002 (20031) REVIEW OR MODIFICATION DATE: Fall Term, 2003 (20041) Fall Term, 2005 (20061) Fall Term, 2008 (20091) Fall Term, 2009 (20101) Proposal 2009-12

Form 2A, Page 2 COURSE TOPICS CONTACT HOURS PER TOPIC I. Remote Network Connectivity Requirements 2 II. Teleworker Connectivity (xdsl and Cable) 5 III. VPNs (including GRE and IPSec) 13 IV. MPLS 5 V. Network Device Hardening 13 VI. Threat Defense Features (Firewalls, IDS, IPS) 13 VII. Case Studies 4 VIII. Hands-on Tests 5 60

PROGRAM TITLE: IT Security Form 2A, Page 3 COURSE TITLE: Managing Network Security CIP NUMBER: 1511100306 LIST PERFORMANCE STANDARD ADDRESSED: NUMBER(S): TITLES(S): 03.0 Install and configure secure network systems software and utilities-the student will be able to: 03.03 Discuss the functions of authentication protocols and Virtual Private Networks (VPNs). 03.10 Install and configure current popular network servers for such services as: Domain Name Service (DNS), Dynamic Host Configuration Protocol (DHCP), e-mail, the World Wide Web (WWW), proxy service, etc.). 04.0 Demonstrate proficiency with Internet structure, organization, and navigation-the student will be able to: 04.02 Describe common Internet services and port numbers. 04.03 Demonstrate the use of internetworking protocols, including: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), e-mail protocols such as Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3), Telnet, etc.). 04.05 Demonstrate the use of typical remote access mechanisms such as Telnet. 04.06 Describe the data format and proprietary nature of commonly used Internet file types. 05.0 Demonstrate an understanding of network access control systems and methodology-the student will be able to: 05.01 Specify by access control mechanisms what users can do, which resources they can access, and what operations they can perform on a system 05.02 Compare and contrast several access control techniques, including access control lists, discretionary, mandatory, lattice-based, rule-based, and role-based access control 05.03 Administer computer, group, and user accounts 05.04 Manage policies, rights, permissions, and passwords for users and/or groups of users 05.06 Oversee password and PIN selection, management, and control 05.08 Implement centralized/remote authentication access controls such as RADIUS and TACACS 05.11 Demonstrate an understanding of the different types of intrusions and the different methods of intrusion detection, including data extraction, sampling, recognition and traffic analysis 05.12 Monitor the network using various forms of intrusion detection resources to detect attacks 05.13 Investigate audit trails for signs of network intrusions 05.14 Perform penetration testing to find weaknesses in the access control systems. 06.0 Describe cryptography concepts, standards, and applications-the student will be able to: 06.01 Demonstrate an understanding of the encryption/decryption process. 06.02 Demonstrate an understanding of the basic functions involved in key management including creation, distribution, verification, revocation, destruction, storage, recovery, and life span of keys.

LIST PERFORMANCE STANDARD ADDRESSED: (Continued) Form 2A, Page 4 NUMBER(S): TITLES(S): 06.03 Utilize various forms of cryptography, digital certificates, and digital signatures to achieve confidentiality, integrity, authentication, and non-repudiation in an enterprise data communications network. 06.04 Discuss the creation and use of digital certificates and digital signatures to provide authentication of users and verification of data integrity in network communications. 06.05 Employ cryptographic algorithms such as DES, RSA, MD5 and DSA. 06.06 Identify the strengths and weaknesses of cryptographic algorithms and the effects of key length. 06.07 Implement current popular key distribution methods including manual, Kerberos, and Internet Security Association and Key Management Protocol (ISAKMP). 06.08 Utilize application and network-based protocols such as Secure Socket Layer (SSL), Secure HyperText Transfer Protocol (SHTTP), and Internetworking Protocol Security (IPSEC). 07.0 Perform telecommunications and network security activities The student will be able to: 07.01 Utilize protocol layering models such as the Open Systems Interconnection (OSI) model in analyzing network security threats. 07.04 Configure authentication protocol services such as RADIUS/TACACS to provide dial-in authentication and security. 07.05 Employ network monitors and packet sniffers to identify security threats. 07.06 Implement security measures using hardware and software such as firewalls, routers, switches, gateways, and proxies. 07.07 Discuss the security vulnerabilities of the Transmission Control Protocol/Internetworking Protocol (TCP/IP) protocol stack. 07.08 Configure Network Layer security protocols such as Internetworking Protocol Security (IPSEC). 07.09 Configure Transport Layer security protocols such as Secure Socket Layer (SSL). 07.10 Utilize Secure Multipurpose Internet Mail Extensions (S/MIME), Secure Socket Layer (SSL) and other Application Layer security protocols. 07.11 Perform connection verification and authentication using Challenge Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP). 07.12 Demonstrate an understanding of how wide area network serial line protocols such as Frame relay, X.25, High-level Data Link Control (HDLC), Point-to-Point Protocol (PPP) and Integrated Services Digital Network (ISDN), and Digital Subscriber Line (DSL) work. 07.13 Implement secure data communication techniques such as Virtual Private Networks (VPNs), tunneling, Network Address Translation (NAT), and transmission logging. 07.15 Employ alarms and signals to alert network security administrators of intrusions. 14.0 Perform operations and security management practices-the student will be able to: 14.04 Protect the privacy of personal data. 14.07 Determine what resources, including hardware/software, password files, source code, storage and logs, require protection. 14.11 Utilize monitoring tools and techniques such as trend analysis, traffic analysis and reporting mechanisms.

Form 2A, Page 5 LIST PERFORMANCE STANDARD ADDRESSED: (Continued) NUMBER(S): TITLES(S): 14.12 Implement countermeasures to defend against threats such as fraud, theft, employee sabotage, espionage, terrorism, and hackers. 15.0 Employ applications and systems development security techniques- The student will be able to: 15.04 Implement features to ensure data and application integrity, security and availability. 15.16 Employ countermeasures to defend against attacks such as brute force and replay attacks.

Florida State College At Jacksonville Course Learning Outcomes & Assessment For All College Credit Courses Section 1 COURSE PREFIX AND NUMBER: CTS 2658 SEMESTER CREDIT HOURS: 4 COURSE TITLE: Managing Network Security Section 2 TYPE OF COURSE: (Click on the box to check all that apply) AA Elective AS Required Professional Course College Prep AS Professional Elective AAS Required Professional Course Technical Certificate Other General Education: (For General Education courses, you must also complete Section 3 and Section 7) Section 3 (If applicable) INDICATE BELOW THE DISCIPLINE AREA FOR GENERAL EDUCATION COURSES: Communication Social & Behavioral Sciences Mathematics Natural Sciences Humanities Section 4 INTELLECTUAL COMPETENCIES: Reading Speaking Critical Analysis Quantitative Skills Scientific Method of Inquiry Writing Listening Information Ethical Literacy Judgment Working Collaboratively Section 5 LEARNING OUTCOMES METHOD OF ASSESSMENT Describe and configure teleworker access, including xdsl and cable. Create a Network Security Policy Written Assessment Describe and implement basic Frame-Mode MPLS and MPLS VPN Describe and configure site-to-site IPSEC and GRE VPNs, and remote client VPNs. Describe local and remote network security vulnerabilities, threats, and attacks such as Denial of Services. Describe and implement strategies to combat these threats. Topics and tasks include setting up AAA (Authentication, Authorization, and Accounting), ACLs, CBAC, DHCP, DMZs, NTP, NAT/PAT, SSH, firewalls and device hardening using both CLI and SDM. Also, research and discuss current network security devices and practices including stateful packet filtering and 802.1x. Describe and configure IOS Intrusion Detection Systems, Intrusion Protection Systems, and monitoring systems such as SNMP and syslog. Case Study including IPSEC, GRE, SDM, CLI, Frame-Mode Written and Configured Case Studies (eportfolio MPLS, and implementing security best practices. requirement) Section 6 Name of Person Completing This Form: Kevin Hampton Date: 2/19/2008