Apr 25, 2024  
2019-2020 Archived Catalog 
    
2019-2020 Archived Catalog

COMN-274 Cybersecurity and Ethical Hacking

Credits 3 / 3 Contact Hours
Pre-requisite: Placement into RDNG-016 (ACSR-016). Pre- or Co-requisite: COMN-184 and COMN-224. NOTE: Students must provide own storage device.
This course combines an ethical methodology with the hands-on application of security tools to assist students in building, supporting, and maintaining secure network systems. Students will utilize multiple countermeasures that effectively reduce and/or mitigate attacks.

Course Outcomes
Describe user access

Learning Objectives

  • Employ user access through authentication
  • Identify flaws in authentication technologies for applications
  • Demonstrate methods to secure authentication for applications

Performance Standards

  • Students identify user access through authentication
  • Students identify flaws in authentication technologies for applications
  • Students identify methods to secure authentication for applications

Examine and identify Web application vulnerabilities

Learning Objectives

  • Define Web application security
  • Identify vulnerabilities of Web applications
  • Demonstrate how to secure a Web application

Performance Standards

  • Students define Web application security
  • Students identify vulnerabilities of Web applications
  • Students explain how to secure a Web application

Describe logic flaws and their impact on Security

Learning Objectives

  • Define logic flaws
  • Identify logic flaws
  • Demonstrate methods to avoid logic flaws

Performance Standards

  • Students define logic flaws
  • Students identify logic flaws
  • Students classify methods to avoid logic flaws

Describe the various attacks that occur against web servers

Learning Objectives

  • Define web server
  • ldentify possible attacks on web servers
  • Define information disclosure and leakage

Performance Standards

  • Students define web server
  • Students identify possible attacks on web servers
  • Students define information disclosure and leakage

Apply hardening techniques to Servers

Learning Objectives

  • Discuss the role of security in a server environment
  • Restrict settings through Group Policy Objects (GPOs)
  • Implement encryption in a server environment

Performance Standards

  • Students classify the role of security in a server environment
  • Students identify restricting settings through Group Policy Objects (GPOs)
  • Students implement encryption in a server environment

Apply hardening techniques to workstation computers

Learning Objectives

  • Discuss the role of information security on a workstation
  • Apply firewall rules on workstation computers
  • Apply antivirus protection to workstation computers

Performance Standards

  • Students identify the role of information security on a workstation
  • Students apply firewall rules on workstation computers
  • Students apply antivirus protection to workstation computers

Implement secure communications across a computing environment

Learning Objectives

  • Discuss the role of encryption within a computing environment
  • Examine virtual private networks
  • Implement encryption in a server environment

Performance Standards

  • Students classify the role of encryption within a computing environment
  • Students identify virtual private networks
  • Students implement encryption in a server environment

Build a standard operating procedure (SOP)

Learning Objectives

  • Discuss the necessity for documenting procedures
  • Create a procedure guide for computer security
  • Examine Defense Information Systems Agency Security Technical Implementation Guides

Performance Standards

  • Students classify the necessity for documenting procedures
  • Students develop a procedure guide for computer security
  • Students classify Defense Information Systems Agency Security Technical Implementation Guides

Manage user and administrator account privilege levels

Learning Objectives

  • Distinguish between user and administrative accounts
  • Control user access on a workstation computer
  • Control administrative access on a server

Performance Standards

  • Students identify differences between user and administrative accounts
  • Students identify user’s control access on a workstation computer
  • Students identify administrative’s control access on a server