230617 - NS - Network Security



Similar documents
ITSM - Information Technology Service Management

SCPD - System on Chip Physical Design

AMC - Advanced Mobile Communications

BMAC - Basic Mathematics for Algebraic Coding Theory with Applications to Cryptography

CCNA Security v1.0 Scope and Sequence

EDM - Electronic Devices Modelling

CISCO IOS NETWORK SECURITY (IINS)

CCNA Security v1.0 Scope and Sequence

Cisco Certified Security Professional (CCSP)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CRIPT - Cryptography and Network Security

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ICAB5238B Build a highly secure firewall

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

DSAP - Digital Speech and Audio Processing

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Network System Design Lesson Objectives

DARFM - Design and Analysis of RF and Microwave Systems for Communications

AIGI - Smart Airport and Facility Management

INFORMATION TECHNOLOGY ENGINEER V

CCNA Cisco Associate- Level Certifications

Cisco Certified Network Expert (CCNE)

Tim Bovles WILEY. Wiley Publishing, Inc.

CCNA Security 2.0 Scope and Sequence

Best Practices for Outdoor Wireless Security

PI - Internet Protocols

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Information, Network & Cyber Security

UVic Department of Electrical and Computer Engineering

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

CCIE Exam Certification CCIE Routing and Switching Exam Certification Guide dec-2009

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

SpiderCloud E-RAN Security Overview

Implementing Cisco IOS Network Security v2.0 (IINS)

The Cisco ASA 5500 as a Superior Firewall Solution

IMIT - Innovation Management and International Trade

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security Guidelines. e-governance

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Deploying a Secure Wireless VoIP Solution in Healthcare

(d-5273) CCIE Security v3.0 Written Exam Topics

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Designing a Windows Server 2008 Network Infrastructure

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

ATV - Lifetime Data Analysis

Associate in Science Degree in Computer Network Systems Engineering

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Developing Network Security Strategies

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

AC : INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Computer Network Engineering

DAIC - Advanced Experimental Design in Clinical Research

Cisco Actualtests Exam Questions & Answers

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

REMOTE ACCESS POLICY OCIO TABLE OF CONTENTS

Network Access Security. Lesson 10

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Table of Contents. Introduction. Audience. At Course Completion

CISCO TECHNICAL TRAINING

Curran, K. Tutorials. Independent study (including assessment) N/A

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Introduction to Cyber Security / Information Security

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

DSPS - Sustainable Design of Products and Services

A Preliminary Evaluation of the new Cisco Network Security Course

The Protection Mission a constant endeavor

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Juniper Networks Education Services

Cisco Advanced Services for Network Security

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Principles of Information Assurance Syllabus

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Alcatel-Lucent Technology Training

PSEAEREE - Electronic System Design Applied to Renewable Energy and Energy Efficiency

1. Name of Course: Windows Server 2008, Enterprise Administrator

Computer Network Engineering

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Transcription:

Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 744 - ENTEL - Department of Network Engineering DEGREE IN TELECOMMUNICATIONS ENGINEERING (Syllabus 1992). (Teaching unit Optional) DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S DEGREE IN NETWORK ENGINEERING (Syllabus 2009). (Teaching unit Optional) MASTER'S DEGREE IN INFORMATION AND COMMUNICATION TECHNOLOGIES (Syllabus 2009). (Teaching unit Optional) MASTER'S DEGREE IN TELECOMMUNICATIONS ENGINEERING (Syllabus 2013). (Teaching unit Optional) 5 Teaching languages: English Teaching staff Coordinator: Others: JOSEP PEGUEROLES VALLÉS MIGUEL SORIANO IBAÑEZ, JUAN HERNANDEZ SERRANO Degree competences to which the subject contributes Specific: 1. Ability to model, design, implement, manage, operate, administrate and maintain networks, services and contents 2. Ability to plan networks and decision-making about services and applications taking into account: quality of service, operational and direct costs, implementation plan, supervision, security processes, scalability and maintenance. Ability to manage and assure the quality during the development process 3. Ability to understand and to know how to apply the functioning and organization of the Internet, new generation Internet technologies and protocols, component models, middleware and services Transversal: 4. TEAMWORK: Being able to work in an interdisciplinary team, whether as a member or as a leader, with the aim of contributing to projects pragmatically and responsibly and making commitments in view of the resources that are available. 5. EFFECTIVE USE OF INFORMATION RESOURCES: Managing the acquisition, structuring, analysis and display of data and information in the chosen area of specialisation and critically assessing the results obtained. 6. FOREIGN LANGUAGE: Achieving a level of spoken and written proficiency in a foreign language, preferably English, that meets the needs of the profession and the labour market. Teaching methodology - Lectures - Laboratory practical work - Group work (distance) - Individual work (distance) - Oral presentations - Short answer test (Control) - Extended answer test (Final Exam) Learning objectives of the subject 1 / 6

Learning objectives of the subject: The aim of this course is to train students in methods of designing, evaluating and understanding the basic mechanisms for securing a data communications networks. We propose a practical approach where the different concepts introduced in the lectures are deployed in the lab in real networks. Learning results of the subject: - Ability to specify, design networks, services, processes and applications of telecommunications in both a fixed, mobile, personal, local or long distance, with different bandwidths in multicast networks, including voice and data. - Ability to apply both traffic engineering tools as planning tools, dimensioning and network analysis. - Ability to analyse, model and implement new architectures, network protocols and communication interfaces and new network services and applications. - Ability to analyse, model and apply advanced techniques both security, including cryptographic protocols, firewalls, and collection mechanisms, authentication and content protection. Study load Total learning time: 125h Hours large group: 26h 20.80% Hours medium group: 0h 0.00% Hours small group: 13h 10.40% Guided activities: 0h 0.00% Self study: 86h 68.80% 2 / 6

Content 1. Introduction Learning time: 8h Theory classes: 2h Self study : 6h - Fundamental principles of secure networks - Worms, viruses, and trojans - Botnets - Attack Methodologies - Monitoring devices 2. Authentication, authorization and accounting (AAA) Learning time: 21h Laboratory classes: 3h Self study : 14h - Purpose of AAA Protocols AAA: Radius and Diameter - AAA server based configuration 3. Perimeter Security Learning time: 26h Theory classes: 6h Self study : 18h - Introduction to firewalls - Firewall technologies - Access Control based on firewall policy context - Detection systems and intrusion prevention (IDPS) - Fundamentals of IDPS technologies - HIDPS, NIDPS and Honeypots 3 / 6

4. LAN protection Learning time: 14h Theory classes: 2h Self study : 10h - Security Considerations Layer 2 - Wireless, VoIP and SAN security considerations - Configuring Switch Security SPAN and RSPAN 5. Virtual Private Networks VPNs Learning time: 18h Self study : 12h - Introduction. Requirements and types of VPNs: remote access, point to point and internal - Components and operations of IPSec VPNs - SSL VPNs: architecture and fundamentals 6. Manage a secure network Learning time: 18h Self study : 12h - Life cycle of a secure Self-Defending Network - Construction of a comprehensive security policy 7. Network Forensics Learning time: 20h Self study : 14h - Forensics phases. Digital Evidence. Common occurrences - Collection of information. Toolbox. Procedures. - Timeline. Data search. Recovering deleted files - Analysis of evidence. Event audit 4 / 6

Planning of activities LABORATORY - Radius/Diameter lab - Firewall lab - WiFi Security lab - VPN lab - Network management lab - Forensics lab EXERCISES Exercises to strengthen the theoretical knowledge. ORAL PRESENTATION Presentation of Use Case: Network Security Management. SHORT ANSWER TEST (CONTROL) Mid term control. SHORT ANSWER TEST (TEST) Partial evaluation test with theoretical questions and short exercises. EXTENDED ANSWER TEST (FINAL EXAMINATION) Final examination. Qualification system Final examination: 25% Partial examinations and controls: 25% Exercises: 10% Individual assessments: 10% Laboratory assessments: 30% 5 / 6

Bibliography Basic: Anderson, R.J. Security engineering: a guide to building dependable distributed systems. 2nd ed. New York: John Wiley & Sons, 2008. ISBN 978-0-470-06852-6. Complementary: Bosworth, S.; Kabay, M.E.; Whyne, E. Computer security handbook. 5th ed. New York: John Wiley & Sons, 2012. ISBN 9780470413746. 6 / 6