CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:



Similar documents
CENTRAL TEXAS COLLEGE ITSE 2486 INTERNSHIP, COMPUTER PROGRAMMING/PROGRAMMER, GENERAL. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITNW 1316 NETWORK ADMINISTRATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSE 2459 ADVANCED COMPUTER PROGRAMMING C# Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSE 1302 COMPUTER PROGRAMMING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR POFT 2312 BUSINESS CORRESPONDENCE AND COMMUNICATION Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR POFT 1319 RECORDS AND INFORMATION MANAGEMENT Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

II. LEARNING OUTCOMES A. Upon successful completion of this course, Introduction to Early Childhood Education, the student will be able to:

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTC 2488 INTERNSHIP GRAPHIC DESIGN. Semester Hours Credit: 4 Contact Hours: 304 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR MUSI 1306 MUSIC APPRECIATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR COMM 2324 PRACTICUM IN ELECTRONIC MEDIA (ADVANCED AUDIO) Semester Credit Hours: 3 INSTRUCTOR:

CENTRAL TEXAS COLLEGE SYLLABUS FOR CDEC 1354 CHILD GROWTH AND DEVELOPMENT :30-8:30 P.M. 217 RM

CENTRAL TEXAS COLLEGE SYLLABUS FOR ACCT 2301 PRINCIPLES OF FINANCIAL ACCOUNTING. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR SPCH 1318 INTERPERSONAL COMMUNICATION. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE HRPO 2301 HUMAN RESOURCES MANAGEMENT Semester Hours Credit: 3 INSTRUCTOR: ( ) OFFICE HOURS: ( )

CENTRAL TEXAS COLLEGE SYLLABUS FOR LGLA 2303 TORTS AND PERSONAL INJURY LAW Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR RELE 1325 REAL ESTATE MATH. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

Central Texas College HAMG 2388 Internship Hospitality Administration and Management. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR LGLA 1317 LAW OFFICE TECHNOLOGY Semester Hours Credit: 3 INSTRUCTOR: OFFICE PHONE:

CENTRAL TEXAS COLLEGE SYLLABUS FOR RELE 1315 REAL ESTATE PROPERTY MANAGEMENT. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

Central Texas College. Menu Management Semester Hours Credit: 2

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

CENTRAL TEXAS COLLEGE DEPARTMENT OF DRAFTING AND DESIGN SYLLABUS FOR DFTG 1417 ARCHITECTURAL DRAFTING-RESIDENTIAL

CENTRAL TEXAS COLLEGE SYLLABUS FOR RELE 1311 LAW OF CONTRACTS. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE GOVT 2305 Federal Government (Federal constitution & topics) Semester Credit Hours: 3 INSTRUCTOR:

Central Texas College. Ft. Riley, KS. GOVT 2306 Texas Government. Independent Study

CENTRAL TEXAS COLLEGE INDUSTRIAL TECHNOLOGY DEPARTMENT SYLLABUS FOR ARTC 1327 TYPOGRAPHY

IMPORTANT NOTE REGARDING FEEDBACK AND RESPONSIBILITY FOR LEARNING

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTS 2357 PHOTOGRAPHY II. Semester Hours Credit : 3

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

CENTRAL TEXAS COLLEGE SYLLABUS FOR DSMA 0306 INTRODUCTORY ALGEBRA. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTS 1311 DESIGN I. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

DEGREE REQUIREMENTS & ACADEMIC GUIDELINES

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CENTRAL TEXAS COLLEGE SYLLABUS FOR HMSY 1470 FINAL PROJECT IN HOMELAND SECURITY AND EMERGENCY MANAGEMENT Semester Hours Credit: 3

Course Syllabus GAME 1336 Intro. to 3D Game Modeling Spring 2015 CRN: 46650

EDUC 1301: INTRODUCTION TO THE TEACHING PROFESSION COURSE SYLLABUS

UVic Department of Electrical and Computer Engineering

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTS 2347 CERAMICS II. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

Computer Information Security. Course Syllabus

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

Professor: Monica Hernandez Phone: (956) Dept. Secretary Ms. Canales

CENTRAL TEXAS COLLEGE SYLLABUS FOR AIRP 1307 AVIATION METEOROLOGY Semester Hours Credit: 3

SYLLABUS FOR ENGLISH 2311 TECHNICAL AND BUSINESS WRITING. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

SOUTHEASTERN LOUISIANA UNIVERSITY School of Nursing Spring, Completion of all 200 level nursing courses

Midlands Technical College MED 134 Medical Assisting Financial Management - Hybrid Health Sciences Medical Assisting Sum mer

Florida State College at Jacksonville MAC 1105: College Algebra Summer Term 2011 Reference: MW 12:00 PM 1:45 PM, South Campus Rm: G-314

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

Medical Assistant Program Coleman College for Health Sciences

HOWARD. UNIVERSITY School of Business

Psychology of Sport and Exercise

CS 464/564 Networked Systems Security SYLLABUS

ACC Child Care & Development Department CDEC Special Topics in Early Childhood Master Syllabus

GOVT 2305 Federal Government Frank Phillips College

Syllabus Systems Analysis and Design Page 1 of 6

CIS 4204 Ethical Hacking Fall, 2014

HIM 103 Introduction to Health Information Management & Coding and Classification Systems Health Sciences Health Information Management Spring 2015

HITT 1249/1349 AUSTIN COMMUNITY COLLEGE Semester: Fall 2015 Course Dates: Aug 24 Dec 16, 2015

Central Alabama Community College

BIOL FUNDAMENTALS OF HUMAN ANATOMY & PHYSIOLOGY II, Fall 2015

Learning Web Page: Office Hours: I can be melvin.mays@hccs.edu or

CIS 213 PENETRATION TESTING 3 cr. (2-2)

SOC 101 Introduction to Sociology Social & Behavioral Sciences Department

Midlands Technical College MED 124- Medical Computer Practicum- Hybrid Health Sciences Medical Assisting Spring

Address: XXX. Semester/Year: xxx

Applied Network Security Course Syllabus Spring 2015

HITT 1345 AUSTIN COMMUNITY COLLEGE Semester: Spring 2016 Course Dates: January 19 May 15, HITT Health Care Delivery Systems

CS Ethical Hacking Spring 2016

CRJU 1068-Criminal Law for Criminal Justice COURSE SYLLABUS Lecture Spring Semester 2016

CENTRAL TEXAS COLLEGE SYLLABUS FOR SPAN 1411/1412 BEGINNING SPANISH I & II. Semester Hours Credit: 4/4 INSTRUCTOR: OFFICE HOURS:

Central Texas College CLASS SYLLABUS Term: 1 Fall Colorado Ave., Bldg 733E Fort Leonard Wood, MO (573)

JOHN A. LOGAN COLLEGE M. Rogers SM 14. CIS SECURITY AWARENESS 3 cr. (3-0)

The University of Texas at Tyler COLLEGE OF BUSINESS & TECHNOLOGY Fall Semester 2013 Course Syllabus. Introduction to the American Health Care System

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.

Forensic Biology 3318 Syllabus

Small Business Management BUSG 2309 Course Syllabus

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

MONTGOMERY COLLEGE Rockville Campus CA141 Introduction to Database Applications Computer Applications Department

BIOL 1004 SYLLABUS. COURSE OUTCOMES: The student will demonstrate knowledge of the parts and functions of a cell.

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

ACC Child Care & Development Department CDEC 1417-Child Development Associate Training I Master Syllabus

Alabama Department of Postsecondary Education. Representing The Alabama Community College System

COURSE SYLLABUS. Instructor Background: M.S. Computer Information Systems, Nova Southeastern University

Medical Assistant Program Coleman College for Health Sciences

Transcription:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and responses to security attacks. Use Best Practices to design, implement, and monitor a network security plan. Examine security incident postmortem reporting and ongoing network security activities. B. This course serves as a required or elective course on various degree plans. Curriculum plans for degrees and certificates are listed in the current Central Texas College catalog. C. The delivery method of this course may be traditional lecture/lab, blended lecture/lab, or online. D. Prerequisites: ITNW 1358 Network+ II. LEARNING OUTCOMES Upon successful completion of this course, Firewalls and Network Security, the student will be A. Demonstrate system security skills through firewall implementation and testing. (C5, C6, C8, C15, C19, C20). B. Use system tools, practices, and relevant technologies to implement a security plan. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). C. Evaluate practices, tools, and technologies to identify security breaches, sources of attacks, and protect mission critical systems. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). D. Establish an appropriate level of security based on an analysis of security logs. (C5, C6, C8, C15, C19, C20). E. Use relevant tools to secure a network, respond to and follow up on various types of attacks. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). June 2015

III. INSTRUCTIONAL MATERIALS A. The instructional materials identified for this course are viewable through www.ctcd.edu/books B. Lecture Classes also require at least one USB storage device. (2-4 GB preferred). IV. COURSE REQUIREMENTS A. Attend both lecture and lab or in the case of online delivery, be actively engaged in Blackboard and maintain constant progress. B. Be prepared to participate in discussion, team projects/assignments and take unannounced assessments relating to the lecture materials. C. Complete all exams/assessments. D. Submit all assignments on time. V. ASSESSMENTS A. Student content mastery will be evaluated in the following areas: Assessments (midterm exam, quizzes, projects, discussion etc.) Final Assessment (final exam and/or semester project, participation) B. Scheduled and unscheduled assessments will be given at the discretion of the instructor. C. Exams/assessments may be composed of both subjective and objective questions plus computer output. D. A student must take all exams/assessments. Both online and on campus students who know in advance that they will be absent due to school sponsored trips, military duty or orders, or any other valid reason, must arrange to take an early exam/assessment. Unexpected absences due to illness or other extenuating circumstances will require the student to contact the instructor about make-up work in lieu of the missed exam/assessment. E. Students with unexcused absences will be given a zero for each missed assignment. ITSY 2401 2

VI. SEMESTER GRADE COMPUTATIONS Course Requirements Points Points Grade Quality Points Assignments 300 900-1000 A-Superior 4 Assessments 300 800-899 B-Above Average 3 Final Assessment 400 700-799 C-Average 2 600-699 D-Passing, but 1 unsatisfactory TOTAL 1000 0-599 F-Failure 0 VII. NOTES AND ADDITIONAL INSTRUCTIONS FROM THE INSTRUCTOR A. Course Withdrawal: It is the student s responsibility to officially withdraw from a course if circumstances prevent attendance. Any student who desires to, or must, officially withdraw from a course after the first scheduled class meeting must file a Central Texas College Application for Withdrawal (CTC Form 59). The student must sign the withdrawal form. CTC Form 59 will be accepted at any time prior to Friday of the 12th week of classes during the 16-week fall and spring semesters. The deadline for sessions of other lengths is: 10-week session Friday of the 8th week 8-week session Friday of the 6th week 5-week session Friday of the 4th week The equivalent date (75% of the semester) will be used for sessions of other lengths. The specific last day to withdraw is published each semester in the Schedule Bulletin. For non-goarmyed active military students, the effective date of withdrawal is the filing date with the Education Center. For all other students, the effective date of withdrawal is the date that the withdrawal application is received by the Central Texas College representative. Students who used financial aid, military tuition assistance, VA benefits, or other non-personal funds may be required to repay tuition and fees to the funding agency. For specific repayment requirements, contact the Office of Student Financial Aid or Veterans Services Office before withdrawing. Military tuition assistance students should visit their military Education Center or Navy College Office. A student who officially withdraws will be awarded the grade of W provided the student s attendance and academic performance are satisfactory at the time of official withdrawal. Students must file a withdrawal application with the College before they may be considered for withdrawal. ITSY 2401 3

A student may not withdraw from a class for which the instructor has previously issued a grade of F, FI, FN, IP, or XN. B. Instructor Initiated Withdrawals: Faculty are authorized to withdraw students who are not making satisfactory course progress to include failure to meet College attendance requirements as outlined in the section of the Catalog entitled Satisfactory Progress Standards. The instructor will assign the appropriate grade on CTC Form 59 for submission to the registrar. Students enrolled in distance learning courses are expected to maintain constant progress throughout the course. Failure to do so may result in the student being administratively withdrawn by the instructor. Students who have not attended class by the 12th class day of a 16-week course or the 6th class day of an 8-week term may be administratively withdrawn by the instructor with a grade of "W." Students may also be administratively withdrawn from any class when their absences exceed a total of four class meetings for a 16-week course or three class meetings for less than 16-week courses and; in the opinion of the instructor, the student cannot satisfactorily complete the course. In a distance learning course the last date of attendance is the last activity by the student in the course. C. Administrative Withdrawal: A student may be administratively withdrawn by a designated member of the administrative staff of the College when the student has been placed on Academic Suspension or Disciplinary Suspension; the student has an outstanding financial obligation owed to the college; or the student registered for a course without the required prerequisite or departmental permission. The College is under no obligation to refund tuition and fees, or other costs associated with an administrative or instructor initiated withdrawal. D. Incomplete Grade: The College catalog states, An incomplete grade may be given in those cases where the student has completed the majority of the coursework but, because of personal illness, death in the immediate family, or military orders, the student is unable to complete the requirements for a course... Prior approval from the instructor is required before the grade of IP for Incomplete is recorded. E. Cell Phones and Pagers: Students will silence cell phones and mobile devices while in the classroom or lab. F. Americans with Disabilities Act (ADA): Disability Support Services provide services to students who have appropriate documentation of a disability. Students requiring accommodations for class are responsible for contacting the Office of ITSY 2401 4

Disability Support Services (DSS) located on the central campus. This service is available to all students, regardless of location. Review the website at www.ctcd.edu/disability-support for further information. Reasonable accommodations will be given in accordance with the federal and state laws through the DSS office. G. Instructor Discretion: The instructor reserves the right of final decision in course requirements and may make changes to the course outline and/or assignments as needed. H. Civility: Individuals are expected to be aware of what a constructive educational experience is and be respectful of those participating in a learning environment. Failure to do so can result in disciplinary action up to and including expulsion. I. Degree Progression: Students who receive a grade of D are advised not to enroll in the next course for which this course was a prerequisite. J. Failing Grade: The grade of F or FN will be given for academic failure, nonattendance or scholastic dishonesty. K. Scholastic Honesty: All students are expected to maintain the highest standards of scholastic honesty in the preparation of all course work and during examinations. The college policy on scholastic honesty, including definitions on plagiarism, collusion, and cheating can be found at the following URL: http://online.ctcd.edu/plagiarism.cfm ITSY 2401 5

VIII. COURSE OUTLINE A. Unit One: Network Security and Attacks a. Identify the most common dangers to networks b. Understand basic networking c. Employ basic security terminology d. Find the best approach to network security for your organization e. Evaluate the legal issues that will affect your work as a network administrator f. Use resources available for network security g. Describe the most common network attacks and how they are executed h. Identify basic defenses against those attacks i. Configure a system to prevent denial of service attacks, Trojan horse attacks, and buffer overflow attacks a. Read Chapters 1 and 2 (C5, C6, C8, C19, F1, F5, 3. Unit Outline: Follow the sequence of unit objections. B. Unit Two: Fundamentals and Applications a. Explain how firewalls work b. Evaluate firewall solutions c. Differentiate between packet filtering and stateful packet filtering d. Differentiate between application gateway and circuit gateway e. Understand host-based firewalls and router-based firewalls f. Explain the requirements of single machine, small office, network, and enterprise firewalls g. Evaluate the needs and constraints of an individual or company to determine what type of firewall solution is appropriate h. Compare popular firewall solutions i. Recommend an appropriate firewall solution for a given situation a. Read Chapters 3 and 4 (C5, C6, C8, C19, F1, F5, ITSY 2401 6

3. Unit Outline: Follow the sequence of the unit objectives. C. Unit Three: System and Encryption Fundamentals a. Explain how intrusion-detection systems work b. Implement strategies for preventing intrusion c. Identify and describe several popular intrusion-detection systems d. Define the term honey pot e. Identify and describe at least one honey pot implementation f. Explain encryption concepts g. Describe the history of encryption and modern encryption methods h. Describe virtual private networks (VPNs) i. Use some simple decryption techniques a. Read Chapters 5 and 6 (C5, C6, C8, C19, F1, F5, 3. Unit Outline: Follow the sequence of the unit objectives D. Unit Four: VPNs and System Hardening a. Use a virtual private network (VPN) b. Use point-to-point tunneling protocol (PPTP) as an encryption tool for VPNs c. Use layer 2 tunneling protocol (L2TP) as an encryption tool for VPNs d. Add security and privacy to a communication using IPSec e. Understand and evaluate VPN solutions f. Properly configure a Windows system for secure operations g. Properly configure a Linux system for secure operations h. Apply appropriate operating system patches to Windows i. Apply application patches j. Securely configure a Web browser a. Read Chapter 7 and 8 (C5, C6, C8, C19, F1, F5, ITSY 2401 7

3. Unit Outline: Follow the sequence of the unit objectives E. Unit Five: Viruses/Malware/Adware a. Explain how virus attacks work b. Explain how viruses spread c. Distinguish between different types of virus attacks d. Employ virus scanners to detect viruses e. Formulate an appropriate strategy to defend against virus attacks f. Describe Trojan horses g. Take steps to prevent Trojan horse attacks h. Describe spyware i. Use anti-spyware software j. Create anti-spyware policies k. Create effective user policies l. Outline effective system administration policies m. Define access control n. Generate effective developmental policies a. Read Chapter 9, 10, and 11 (C5, C6, C8, C19, F1, F5, 3. Unit Outline: Follow the sequence of the unit objectives F. Unit Six: Security Assessment and Standards a. Evaluate a system s security b. Scan a system for vulnerabilities c. Evaluate the overall security of a network d. Use the Six Ps of security e. Apply a patch to your system f. Document your security g. Apply the U.S. Department of Defense s Orange Book computer security criteria h. Utilize the U.S. Department of Defense s entire Rainbow Series computer security criteria i. Use the Common Criteria computer security criteria ITSY 2401 8

j. Employ other security models, including the Bell-LaPadula, Clark-Wilson, Biba Integrity, Chinese Wall, and State Machine models a. Read Chapter 12 and 13 (C5, C6, C8, C19, F1, F5, b. Complete the assigned quiz and assignment (C5, C6, C8, C19, F1, F5, 3. Unit Outline Follow the sequence of the unit objectives G. Unit Seven: Attacks and Recovery a. Understand physical security b. Implement physical security c. Understand disaster recovery d. Understand business continuity e. Understand the basic techniques used by hackers f. Be able to formulate strategies to defend against common attacks g. Understand how to use some hacking tools a. Read Chapter 14 and 15 (C5, C6, C8, C19, F1, F5, b. Complete the assigned quiz and assignment (C5, C6, C8, C19, F1, F5, 3. Unit Outline: Follow the sequence of the unit objectives H. Unit Eight: Forensics and Terror a. Understand basic forensics principles b. Make a forensic copy of a drive c. Use basic forensic tools d. Defend against computer-based espionage e. Employ defense against computer-based terrorism f. Choose appropriate defense strategies for your network g. Employ defenses against information warfare a. Read Chapter 16 and 17 (C5, C6, C8, C19, F1, F5, b. Complete the assigned quiz and assignment (C5, C6, C8, C19, F1, F5, 3. Unit Outline: Follow the sequence of the unit objectives ITSY 2401 9