information security and its Describe what drives the need for information security.



Similar documents
Linux Network Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CISCO IOS NETWORK SECURITY (IINS)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Networking: EC Council Network Security Administrator NSA

How To Pass A Credit Course At Florida State College At Jacksonville

INFORMATION SECURITY TRAINING CATALOG (2015)

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Intro to Firewalls. Summary

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Security + Certification (ITSY 1076) Syllabus

IT Networking and Security

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

CTS2134 Introduction to Networking. Module Network Security

Introduction p. 2. Introduction to Information Security p. 1. Introduction

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Table of Contents. Introduction. Audience. At Course Completion

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

EC-Council Ethical Hacking and Countermeasures

Firewalls, Tunnels, and Network Intrusion Detection

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Network Security: Introduction

CCNA Security 2.0 Scope and Sequence

CompTIA Security+ (Exam SY0-410)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

NETWORK SECURITY HACKS *

CCNA Security v1.0 Scope and Sequence

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Network Security Administrator

Microsoft Technologies

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

How To Protect Your Network From Attack

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Windows 7, Enterprise Desktop Support Technician

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Security. TestOut Modules

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Scene of the Cybercrime Second Edition. Michael Cross

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Bellevue University Cybersecurity Programs & Courses

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Recommended IP Telephony Architecture

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Firewalls. Chapter 3

Fundamentals of Network Security - Theory and Practice-


IT Networking and Security

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Chapter 9 Firewalls and Intrusion Prevention Systems

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Data Security Incident Response Plan. [Insert Organization Name]

Medical Networks and Operating Systems

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

FIREWALLS & CBAC. philip.heimer@hh.se

Topics in Network Security

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

Network Security: A Practical Approach. Jan L. Harrington

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Network Forensics: Log Analysis

MCSA Security + Certification Program

General Network Security

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Tim Bovles WILEY. Wiley Publishing, Inc.

Basics of Internet Security

Course Outline. Course 6421B : Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow


Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

How To Pass The Information And Network Security Certificate

Bachelor of Information Technology (Network Security)

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Cornerstones of Security

Network Security Policy

6421B - Windows Server 2008 R2 Network Infrastructure

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Configuring & Troubleshooting Windows 2008 Server 2008 Network Infrastructure

2016 TÜBİTAK BİLGEM Cyber Security Institute

INFORMATION SECURITY TRAINING CATALOG (2016)

Securing Cisco Network Devices (SND)

Network Security and Firewall 1

Implementing Cisco IOS Network Security

Introduction to Cyber Security / Information Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Transcription:

Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business. technical aspects of information security and its Describe what drives the need for information security. role in business including legal Describe the need for risk management. and ethical issues, risk Identify and assess risks. management, security Write procedures for assessing and controlling risk including plans for continuity. technologies, physical security and security maintenance. Describe various security technologies and types of physical security and how both are used in business. Discuss the process of implementing security in business including identifying and describing forms of personnel security. Describe the steps involved in information security maintenance including how external influences, such as legislative requirements, affect business. CIS 201 Digital Forensics and the Law: Covers legal issues relevant to information security and digital forensics professionals. Topics: electronic discovery, expert testimony, electronic surveillance, evidence retention, preservation and spoliation, privacy issues, Sarbanes Oxley and other legislation. Describe how electronic discovery differs from digital forensics. List and describe the common legal issues related to electronic evidence. Create a document review, retention, and destruction policy. Write an acceptable use policy and employer privacy statement. List and describe the generally accepted computer forensic procedures. Explain and list the various legislation and regulations that impact technology. Analyze and critique forensic analysis reports. Design the verbiage for a production of document requests. Analyze and critique search warrants, affidavits, and subpoenas. Explain how the Fourth Amendment pertains to computer privacy. Summarize in writing the Washington State Laws that pertain to CyberCrime. CIS 272 Digital Forensics I: Includes basic procedures and methodologies for digital forensics that must be mastered. Acquisition, identification and analysis of evidence, documentation Describe the origin of computer forensics and the relationship between law enforcement and industry. Describe electronic evidence and the computing investigation process. Discuss ethics and its impact on computer forensics. Execute an investigation.

strategies, FAT file system, manual and automated analysis tools, working as an expert witness. CIS 273 Digital Forensics II: Covers advanced topics, NTFS, Registry, Event Logs, Internet History and creating analysis reports. Includes an introduction to processes for conducting testing and verification and processing multiple cases from start to finish. Course maps to the CSFA Certificate. Describe disk structures as well as the Microsoft boot process. Identify where data can be hidden on different platforms. Build both a forensic boot floppy and a forensic workstation. Describe the professional of computer forensics. Use current forensics tools. Perform email and graphic image recovery as well as investigations. Identify standards of professionalism an ethical behavior for information security and digital forensics professional and apply these standards successfully to ethical dilemmas. Demonstrate the ability to properly document a computer forensics investigation/analysis and create reports. Demonstrate the ability to create forensically sound image files and working copy drives from both live and at-rest computer systems using a variety of commercial and open source tools. Demonstrate an understanding of various techniques to overcome encryption and passwords using a variety of commercial and open source tools. Describe the differences between the FAT 16 and FAT 32 file systems and boot records. Describe the function and layout of master boot records, the NTFS Master File Table, and partition tables including how partitions can be hidden and restored. Identify and describe the Windows registry keys that would be examined relevant to a computer forensics investigation. Demonstrate the ability to forensically examine an image from a NTFS system as well as recover deleted files and file fragments using both manual and automated methods. Demonstrate the ability to create a curriculum vita and properly document experience and education for work in the field of computer forensics. Identify standards of professionalism and ethical behavior for information security and digital forensics professionals, and apply these standards successfully to ethical dilemmas.

CIS 274 Intro to Network Security: Covers communication, infrastructure, operational and organizational security, underlying principles used to secure networks, security technologies, intrusion detection, authentication, and cryptography basics. Maps to the Security+ exam. CIS 275 Host System Security I: In-depth coverage of the following Win 2K security features: Active Directory, Kerberos 5, smartcards, IPSec and PKI as well as plugging security holes, authenticate users, defend against attacks and add security practices into administrative tasks. CIS 277 Security Implementation I: Includes analyzing network traffic and vulnerability of various protocols, responding to attacks on FTP, HTTP, DNS, HTTPS and SSH with advanced attack detection Compare and contrast the three basic cryptographic functions. Describe how cryptographic functions can be used to enable security services. Describe authentication, integrity and confidentiality and how they relate to security systems. Describe the use of public key technology in networks and the issues associated with key management. Compare and contrast the various mechanisms that provide authentication services, authentication, authorization, access control as well as several security technologies that provide solutions for securing network access. Given a network security scenario, decide on the proper authentication technology. Describe security technologies used for establishing identity and how security technologies are implemented in corporate networks. Identify strengths and weaknesses associated with protocols designed to authenticate users. Describe the technologies that exist at the different TCP/IP layers, infrastructure security concepts and the protocols used for dial-in security. Discuss how digital signatures are used for secure transactions. Identify and describe the 3 categories of network security threats. Describe the types of resources that need to be protected in a networked environment. Create and write a security policy including procedures for forming a security organization/department. Describe the functions of a security team, the procedures for selecting appropriate security components, and the major types of DOS attacks and how to protect against them. Discuss the process of auditing logs and how the audit process should be implemented. Describe how to conduct a security audit and how to conduct a post-mortem analysis of an attack. Describe Ethernet operation and both IP and ARP security issues. Demonstrate the ability to protect against IP abuse and to use a variety of tools to generate traffic. List the tools available for frame capture/creation. Perform frame level analysis. Detect ARP and IP address spoofing.

using network and host based intrusion detection systems.- CIS 278 Security Implementation II: Includes planning, configuring and implementing firewalls, proxy servers and web filtering as well as the use of log consolidation tools. CIS 279 Designing Network Security: Includes analyzing various networks and business needs; designing and defending appropriate corporate security policies as well as secure networks. Capture and analyze ARP traffic and ICMP echo. Compare and contrast a variety of traffic capture utilities. Describe TCP/IP vulnerability and how to minimize attacks. Analyze FTP and HTTP for their vulnerabilities. Use dsniff to capture passwords. Perform man-in-the-middle attacks on secure web connections and SSH v1. Describe TCP/IP fingerprinting and advanced attack detection procedures. Use the nmap utility to perform network sweep scans. Examine system logs and statistics for signs of attack. Configure portsentry for active response to port scans. Use Snort to examine network traffic in decoded text format and to capture all network packets in tcpdump binary logs. Use tethereal to analyze captured packets. Identify and implement security commands in internetworking devices such as routers, switches and firewalls. Design firewall configuration strategies given a business scenario. Demonstrate the ability to authenticate users and implement appropriate packet filtering. Plan, develop, design and document a firewall strategy. Compare and contrast Bastion Hosts. Implement security for dial-in access, a secure VPN, and appropriate firewall troubleshooting procedures to fix a given problem.. Demonstrate the ability to isolate, contain, document and recover as well as to respond to false alarms. Describe the types of resources that need to be protected in a networked environment. Create a security policy. Write procedures for forming a security organization/department. Describe the functions of a security team. Describe the procedures for selecting appropriate security components. Describe the major types of DOS attacks and how to protect against them. Describe how to conduct security audits. Discuss the process of auditing logs and how the audit process should be implemented.

CIS 293 Digital Forensics III: Covers detecting/documenting root kits, the Trojan horse theory and other advanced topics including the creation of hash sets of hacker tools and illicit programs to be made available to digital forensic professionals throughout the world. Topics may vary based on current trends. Describe how to conduct a post-mortem analysis of an attack. Demonstrate methods to use VMware/Virtual PC as a forensic analysis tool. Demonstrate how to find yet undocumented root kits and kernel level compromises using a variety of tools. Demonstrate the ability to develop and use regular expressions to increase search effectiveness. Demonstrate the ability to defend a particular opinion involving a network intrusion case where a Trojan was allegedly responsible. Demonstrate the ability to create and verify hash sets of various formats including Hashkeeper, NSRL and FTK. Demonstrate the skills and abilities needed to provide expert testimony in the classroom regarding complex digital forensic cases. Identify standards of professionalism and ethical behavior for information security and digital forensics professionals and apply these standards successfully to ethical dilemmas.