CIS 156. Firewalls and Intrusion Detection



Similar documents
CIS 253. Network Security

CIS 270. Systems Analysis and Design

MEA 116. Electronic Medical Records. Course Package

PAR 201. Legal Research and Writing II. Course Package

MEA 141. Medical Billing. Course Package

CIS 241 INTRODUCTION TO E-COMMERCE

MEA 130 MEDICAL CODING I (ICD-10-CM)

CHD 246 CO-OCCURRING DISORDERS

CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT

CIS 280. Computer Information Systems Internship. Course Package

BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS

ASE 133 AUTO HVAC SYSTEMS

MEA 110 ADMINISTRATIVE MEDICAL ASSISTING

BUS 221 FINANCIAL ACCOUNTING

ENG 136 TECHNICAL PROFESSIONAL WRITING

NETWORK SECURITY (W/LAB) Course Syllabus

BUS 204 BUSINESS COMMUNICATIONS

ACC 135. Course Package

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE

DAE 115. Office Management for the Dental Assistant. Course Package

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

HVA 120 RESIDENTIAL HVAC INSTALLATION

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL MCC Form EDU 0007 (rev.

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Network Security Administrator

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

How To Pass A Credit Course At Florida State College At Jacksonville

Network Security Course Specifications

Commercial/Industrial Electricity

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Firewalls, Tunnels, and Network Intrusion Detection

Physical Development for Preschool, Toddlers and Their Parents

BIO 201 ANATOMY AND PHYSIOLOGY I with LAB

New York City College of Technology Computer Systems Technology Department

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Network Security and Firewall 1

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

NAP 117 MEDICATION ASSISTANT COURSE

Client Security Risk Assessment Questionnaire

Course Title: ITAP 3471: Web Server Management

Firewall Architectures of E-Commerce

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Best Practices For Department Server and Enterprise System Checklist

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Cisco Advanced Services for Network Security

Effective Fall 2016 New Course Proposal CMN 3020, Public Relations Research, Evaluation, and Measurement. 2. Course prefix and number: CMN 3020

ICAB5238B Build a highly secure firewall

Implementing Cisco IOS Network Security v2.0 (IINS)

information security and its Describe what drives the need for information security.

Fireware Essentials Exam Study Guide

H.I.P.A.A. Compliance Made Easy Products and Services

ICANWK406A Install, configure and test network security

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Information Blue Valley Schools FEBRUARY 2015

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

UVic Department of Electrical and Computer Engineering

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Computer Network Engineering

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

BlackRidge Technology Transport Access Control: Overview

CNA 432/532 OSI Layers Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Security Technology: Firewalls and VPNs

Eastern Illinois University Revised Course Proposal BUS 2710, Survey of Finance

INTRUSION DETECTION SYSTEMS and Network Security

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

FIREWALL POLICY November 2006 TNS POL - 008

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002)

INCIDENT RESPONSE CHECKLIST

Payment Card Industry Self-Assessment Questionnaire

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Intrusion Detection Systems

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Transcription:

CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011

COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal to Curriculum Sub-committee: 5/6/2011 Purpose: New _X_Change Retire If this is a change, what is being changed? (Check ALL that apply) Update Prefix Title Learning Units _X Competencies Format Change _X_ Course Description Course Number _X_ Textbook Credits Prerequisite Effective Semester/Year Fall 2011 Spring 20 Summer 20 COURSE INFORMATION Prefix & Number: Title: CIS 156 Firewalls and Intrusion Detection Catalog Course Description: This course presents basic concepts of network firewall security to prevent intrusion and destruction of computerized information. Credit Hours: 3 Prerequisite(s) Lecture Hours: Lab Hours: 3 0 CIS 153 Network Essentials or permission of Academic Chair Co-requisite(s) Does this course need a separately scheduled lab component? Yes Does this course require additional fees? If so, please explain. Yes _X No _X No Is there a similar course in the course bank? Yes (Please identify.) _X No Articulation: Is this course or an equivalent offered at other two and four-year No X_Yes (Identify the college, subject,

universities in Arizona? prefix, number and title: Elective credit at ASU and NAU Writing Across the Curriculum Rationale: Mohave Community College firmly supports the idea that writing can be used to improve education; students who write in their respective content areas will learn more and retain what they learn better than those who don t. Courses in the core curriculum have been identified as Writing Across the Curriculum courses. Minimum standards for the Writing Across the Curriculum riculum component are: 1. The writing assignments should total 1500 2000 words. For example, a single report which is 1500 words in length OR a series of essay questions and short papers (example: four 375-word assignments) which total 1500 words could meet the requirement. 2. The writing component will represent at least 10% of a student s final grade in the course. Is this course identified as a Writing Across the Curriculum course? Yes _X No (See addendum for writing rubrics) Intended Course Goals. By the end of the semester, students will be able to: 1. Describe the types and limitations of firewall protection and be able to determine the best hardware and software selections for effective protection. 2. Develop a security policy that defines the responses to security violations and that also reflect an organization s overall security approach. 3. Identify different firewall configuration strategies based on the needs and desired security level of an organization. 4. Configure firewall software and hardware to authenticate and identify users and encrypt data. 5. List the components and essential operations of Virtual Private Networks (VPNs) and create VPN setups such as mesh or hub-and-spoke configurations. 6. Develop an Intrusion Detection System (IDS) and describe appropriate filter rules. Course Competencies and Objectives Competency 1 Explain the basic concepts of network security Objective 1.1 Define the TCP/IP networking design Objective 1.2 Describe the threats to network security Objective 1.3 Explain the goals of network security Objective 1.3 Describe a layered approach to network defense Competency 2 Describe the fundamental concepts and different approaches in analyzing risk analysis Objective 2.1 Explain the process of risk analysis Objective 2.2 Describe the recommended techniques to minimize risk Objective 2.3 Develop a security policy that addresses how an organization should respond to

an attach and the procedure for employees to safely handle data and resources Competency 3 Formulate a security policy and identify security policy procedures Objective 3.1 Explain best practices in security policies including gathering support from every level in the company and keeping these policies current Objective 3.2 Explain the importance of ongoing risk analysis and define incident-handling Objective 3.3 Describe the components of conducting risk assessments and security reviews Competency 4 Analyze network traffic signatures as they relate to suspicious events Objective 4.1 Describe the concepts of signature analysis Objective 4.2 Detect normal and suspicious traffic signatures Objective 4.3 Explain the Common Vulnerabilities and Exposures (CVE) standard Competency 5 Explain basic Virtual Private Network (VPN ) concepts Objective 5.1 Define encapsulation, encryption, and authentication in VPNs Objective 5.2 Summarize the advantages and disadvantages of VPNs Objective 5.3 Discuss the rationale for developing a VPN in a business including convenience and cost effectiveness as compared to the higher security risks of such a system Competency 6 Implement a VPN Objective 6.1 Describe the steps and software necessary to configure a VPN with and without firewalls Objective 6.2 Construct packet-filtering rules for VPNs Objective 6.3 Develop appropriate guidelines for auditing VPNs and VPN policies Competency 7 Identify the components of an Intrusion Detection System (IDS) Objective 7.1 List the appropriate steps of detecting unauthorized access to a networked system including : gathering data, sending alert messages, and automatic responses from an IDS system Objective 7.2 Describe options for implementing intrusion detection systems Objective 7.3 Evaluate different types of IDS products Competency 8 Configure an IDS and create filter rules Objective 8.1 Construct a security incident response team or contact person for your organization Objective 8.2 Explain the six-step incident response process Objective 8.3 Describe the recommended procedure in responding to false alarms to reduce reoccurrences Competency 9 Evaluate firewall hardware and software options Objective 9.1 List the functions of a firewalls Objective 9.2 Create a set of rules and restrictions for a firewall Objective 9.3 Compare the reliability, costs, and difficulty of implementation of various hardware and software firewalls Competency 10 Describe the requirements for securing network perimeters Objective 10.1 Define a bastion host and its function as a gateway between an inside and an outside network Objective 10.2 Explain how to supplement a firewall with a proxy server Objective 10.3 List the considerations necessary when deciding what type of authentication to use: user, session, or client Competency 11 Describe the recommended procedures in firewall management to improve security of digital information Objective 11.1 Manage firewalls to improve security Objective 11.2 Describe the types of log files that most of the firewalls offer, including: security, system, traffic, active, and audit logs Objective 11.3 Explain the parameters needed when choosing a firewall computer including the processor speed, amount of available Random Access Memory (RAM), and cache storage Competency 12 Develop procedures to manage and improve information security Objective 12.1 Compare the advantages and disadvantages of centralized data collection Objective 12.2 Describe the events that you need to monitor, including: logins, creation of

user accounts and groups, correct handling of e-mail attachments, backups, and antivirus scanning and control Objective 12.3 Describe the steps for training your security personnel to respond to security incidents and the importance of keeping informed of industry trends and innovations in the security field Teacher s Guide Course Textbook, Materials and Equipment Textbook(s) Title Guide to Firewalls and VPNs, 3rd Edition or most recent edition Author(s) Weaver Publisher Course Technology 2011 ISBN 9781111135393 Software/ Equipment Textbook Costs Title Author(s) Publisher ISBN Please indicate how much the textbook would cost if purchased through Barnes & Noble: $115.00 Modality X On-ground X On-line Course Assessments Description of Possible Course Assessments (Essays, multiple choice, etc.) Exams standardized for this course? Midterm Final Other (Please specify): Are exams required by the department? Yes _X No If Yes, please specify: Where can faculty members locate or access the required standardized exams for this course? (Contact Person and Location) Example: NCK Academic Chair Office Student Outcomes: Identify the general education goals for student learning that is a component of this course. Check all that apply: 1. Communicate effectively. a. Read and comprehend at a college level. b. Write effectively in a college setting. 2. Demonstrate effective quantitative reasoning and Method of Assessment Develop a security policy plan for distribution to all employees in an organization.

problem solving skills. 3. Demonstrate effective qualitative reasoning skills. Evaluate security options for effectiveness and costs to prevent loss of information data. 4. Apply effective methods of inquiry. a. Generate research paper by gathering information from varied sources, analyzing data and organizing information into a coherent structure. b. Employ the scientific method. 5. Demonstrate sensitivity to diversity a. Experience the creative products of humanity. b. Describe alternate historical, cultural, global perspectives.