CIS 253. Network Security



Similar documents
CIS 156. Firewalls and Intrusion Detection

CIS 270. Systems Analysis and Design

MEA 116. Electronic Medical Records. Course Package

CIS 241 INTRODUCTION TO E-COMMERCE

PAR 201. Legal Research and Writing II. Course Package

MEA 141. Medical Billing. Course Package

MEA 130 MEDICAL CODING I (ICD-10-CM)

CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT

CHD 246 CO-OCCURRING DISORDERS

CIS 280. Computer Information Systems Internship. Course Package

BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS

BUS 221 FINANCIAL ACCOUNTING

MEA 110 ADMINISTRATIVE MEDICAL ASSISTING

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE

ASE 133 AUTO HVAC SYSTEMS

BUS 204 BUSINESS COMMUNICATIONS

ENG 136 TECHNICAL PROFESSIONAL WRITING

Bellevue University Cybersecurity Programs & Courses

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

ACC 135. Course Package

HVA 120 RESIDENTIAL HVAC INSTALLATION

DAE 115. Office Management for the Dental Assistant. Course Package

INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL MCC Form EDU 0007 (rev.

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Implementing Cisco IOS Network Security v2.0 (IINS)

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Table of Contents. Introduction. Audience. At Course Completion

Security + Certification (ITSY 1076) Syllabus

How To Pass A Credit Course At Florida State College At Jacksonville

NAP 117 MEDICATION ASSISTANT COURSE

Network Security Course Specifications

Curran, K. Tutorials. Independent study (including assessment) N/A

Introduction to Cyber Security / Information Security

The Information Security Problem

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NETWORK SECURITY (W/LAB) Course Syllabus

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

BIO 201 ANATOMY AND PHYSIOLOGY I with LAB

CISA TIMETABLE (4 DAYS)

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

IT Networking and Security

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Chapter 1 The Principles of Auditing 1

Weighted Total Mark. Weighted Exam Mark

DRAFT Standard Statement Encryption

Eleventh Hour Security+

Fundamentals of Network Security - Theory and Practice-

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Commercial/Industrial Electricity

Network Security Administrator

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

CNA 432/532 OSI Layers Security

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Section 12 MUST BE COMPLETED BY: 4/22

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

New York City College of Technology Computer Systems Technology Department

(Instructor-led; 3 Days)

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

IT Networking and Security

Networking: EC Council Network Security Administrator NSA

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Exam 1 - CSIS 3755 Information Assurance

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Course Design Document. IS403: Advanced Information Security and Trust

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Supplier Information Security Addendum for GE Restricted Data

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

BUY ONLINE FROM:

Information Security Course Specifications

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

CS 464/564 Networked Systems Security SYLLABUS

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Lecture II : Communication Security Services

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Computer Network Engineering

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Privacy + Security + Integrity

Physical Development for Preschool, Toddlers and Their Parents

An expert s tips for cracking tough CISSP exam

Transcription:

CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011

COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum Sub-committee: 5/6/2011 Purpose: New _X_Change Retire If this is a change, what is being changed? (Check ALL that apply) Update Prefix Title Learning Units _X Competencies Format Change _X_ Course Description Course Number _X_ Textbook Credits Prerequisite Effective Semester/Year Fall 2011 Spring 20 Summer 20 COURSE INFORMATION Prefix & Number: Title: CIS 253 Network Security Catalog Course Description: This course presents network security concepts and discusses the tools and techniques necessary to safeguard computer stored data. Credit Hours: 3 Prerequisite(s) Lecture Hours: Lab Hours: 3 0 Prerequisite CIS 153 Network Essentials or Permission of Academic Chair Co-requisite(s) Does this course need a separately scheduled lab component? Yes Does this course require additional fees? If so, please explain. Yes X No X No Is there a similar course in the course bank? Yes (Please identify.) _X No Articulation: Is this course or an equivalent offered at other two and four-year universities in Arizona? No _X Yes (Identify the college, subject, prefix, number and title: Elective credit to ASU and NAU

Writing Across the Curriculum Rationale: Mohave Community College firmly supports the idea that writing can be used to improve education; students who write in their respective content areas will learn more and retain what they learn better than those who don t. Courses in the core curriculum have been identified as Writing Across the Curriculum courses. Minimum standards for the Writing Across the Curriculum riculum component are: 1. The writing assignments should total 1500 2000 words. For example, a single report which is 1500 words in length OR a series of essay questions and short papers (example: four 375-word assignments) which total 1500 words could meet the requirement. 2. The writing component will represent at least 10% of a student s final grade in the course. Is this course identified as a Writing Across the Curriculum course? Yes X No (See addendum for writing rubrics) Intended Course Goals By the end of the semester, students will be able to: 1. Define security principles and recommended security baselines to assist organizations in defending against attacks on their networked computer systems and mobile systems such as tablets, netbooks and smart phones. 2. Through security policy and procedures, protect both internal and external communications from unauthorized access. 3. Identify the types of basic attacks, i.e. password guessing, social engineering, and identity attacks, and the best procedures to guard against these intrusions. 4. Use effective authentication methods including usernames and passwords, biometrics, and multifactor authentication methods. 5. Describe the steps necessary to secure a network infrastructure using security zones and Virtual Local Area Networks (VLANs). 6. Use Cryptography to create digital signatures and encryption so that information cannot be viewed by unauthorized users when it is transmitted or stored. 7. Design a security policy that includes a password management policy, privacy policy, and acceptable use policy (AUP). Course Competencies and Objectives By the end of the semester, students will be able to:

Competency 1 Define information security and identify the critical challenges for information security professionals Objective 1.1 List and define information security terminology Objective 1.2 List the challenges for security personnel when protecting a network from attacks including the speed of attacks, distributed attacks, and the need for faster detection of weaknesses Objective 1.3 Describe the general roles available in information security careers including security management, security engineering, and security administration. Competency 2 Describe attackers and their motives for harming systems that store, process, and exchange that information Objective 2.1 Develop attacker profiles Objective 2.2 Describe basic attacks and identity attacks Objective 2.3 Identify denial of service attacks Competency 3 Describe the basic principles for designing a secure system which includes access control, authentication, and auditing Objective 3.1 Describe security principles such as layering and obscuring critical data Objective 3.2 Use effective authentication methods Objective 3.3 Control access to computer systems and audit information security schemes Objective 3.4 List the steps necessary to disable nonessential systems and ensure updates to systems are conducted on a routine basis Competency 4 Create policies to protect the network and organizational infrastructure Objective 4.1 Design and/or document a network topology of an organization Objective 4.2 Secure removable media by establishing security policies and procedures Objective 4.3 Define a VLAN Virtual Local Area Network and its advantages and disadvantages when addressing security concerns Objective 4.4 Construct a security zone to separate secure users from outsiders Objective 4.5 Describe security provisions and unique security features needed for tablets, netbooks, smart phones, and other mobile devices. Competency 5 Develop the procedures necessary to protect electronic communication Objective 5.1 Define the common attacks of e-mail systems including malware, spam, and hoaxes Objective 5.2 Define repurposed programming or using programming tools in ways more harmful than for what they were originally intended as it relates to Web attacks Objective 5.3 Describe the steps necessary to protect Web communications using Secure Sockets Layer/Transport Layer Security protocol Objective 5.4 Define tunneling protocols as the technique of encapsulating one packet of data within another type to create a secure link of transportation, Competency 6 Explain cryptography concepts and define the terminology of encryption Objective 6.1 Define cryptography and security procedures using hashing algorithms Objective 6.2 List the steps to protect data with symmetric and asymmetric encryption algorithms Objective 6.3 Develop a digital signature to secure communication data Objective 6.4 Explain cryptography strengths and vulnerabilities Competency 7 Develop an operational security plan Objective 7.1 List the three most important procedures for developing a security plan, 1) establish a physical security perimeter, 2) establish a business continuity plan, and 3) plan for disaster recovery Objective 7.2 Define two types of defenses that are commonly referenced when shielding wireless signals: Telecommunications Electronics Material Protected from Emanating Spurious Transmissions, or TEMPEST and Faraday cage. Objective 7.3 Construct a disaster recovery plan (DRP) that addresses what to do if a major catastrophe occurs that could cause the organization to cease functioning

Competency 8 Develop a security policy for protecting computer information systems in an organization Objective 8.1 Design a security policy and that includes compliance monitoring and evaluation Objective 8.2 Describe the security policy cycle Objective 8.3 Define types of security policies including acceptable use policy, human resource policy, password management policy, privacy policy, disposal and destruction policy, and service-level agreement Competency 9 Develop a security management plan Objective 9.1 Define identity management and digital rights management Objective 9.2 Develop an effective training and education program for users Objective 9.3 Create a plan that considers changes in system architecture and classifications of sensitive documents Competency 10 Describe security careers and the skills necessary to become a security professional Objective 10.1 Define computer forensics and the proper response to an incident Objective 10.2 List information security jobs and skills Objective 10.3 Describe host intrusion prevention (HIP) and behavior blocking as two of the latest defenses in network security Teacher s Guide Course Textbook, Materials and Equipment Textbook(s) Title Security + Guide to Network Security Fundamentals, 4th ed. or most recent edition Author(s) Ciampa Publisher Course Technology ISBN 9781111640125 Software/ Equipment Textbook Costs Title Author(s) Publisher ISBN Please indicate how much the textbook would cost if purchased through Barnes & Noble: $110.00 Modality _X On-ground _X On-line Course Assessments Description of Possible Course Assessments (Essays, multiple choice, etc.) Exams standardized for this course? Midterm Final Other (Please specify): Are exams required by the department? Yes _X No If Yes, please specify: Where can faculty members locate or access the required

standardized exams for this course? (Contact Person and Location) Example: NCK Academic Chair Office Student Outcomes: Identify the general education goals for student learning that is a component of this course. Check all that apply: 1. Communicate effectively. a. Read and comprehend at a college level. b. Write effectively in a college setting. Method of Assessment Create a security procedures document for institutional policy. 2. Demonstrate effective quantitative reasoning and problem solving skills. 3. Demonstrate effective qualitative reasoning skills. Present solutions to case problems involving data security policies and procedures. 4. Apply effective methods of inquiry. a. Generate research paper by gathering information from varied sources, analyzing data and organizing information into a coherent structure. b. Employ the scientific method. 5. Demonstrate sensitivity to diversity a. Experience the creative products of humanity. b. Describe alternate historical, cultural, global perspectives.