2019-2020 Archived Catalog
|
COMN-274 Cybersecurity and Ethical HackingCredits 3 / 3 Contact Hours Pre-requisite: Placement into RDNG-016 (ACSR-016). Pre- or Co-requisite: COMN-184 and COMN-224. NOTE: Students must provide own storage device. This course combines an ethical methodology with the hands-on application of security tools to assist students in building, supporting, and maintaining secure network systems. Students will utilize multiple countermeasures that effectively reduce and/or mitigate attacks.
Course Outcomes Describe user access
Learning Objectives
- Employ user access through authentication
- Identify flaws in authentication technologies for applications
- Demonstrate methods to secure authentication for applications
Performance Standards
- Students identify user access through authentication
- Students identify flaws in authentication technologies for applications
- Students identify methods to secure authentication for applications
Examine and identify Web application vulnerabilities
Learning Objectives
- Define Web application security
- Identify vulnerabilities of Web applications
- Demonstrate how to secure a Web application
Performance Standards
- Students define Web application security
- Students identify vulnerabilities of Web applications
- Students explain how to secure a Web application
Describe logic flaws and their impact on Security
Learning Objectives
- Define logic flaws
- Identify logic flaws
- Demonstrate methods to avoid logic flaws
Performance Standards
- Students define logic flaws
- Students identify logic flaws
- Students classify methods to avoid logic flaws
Describe the various attacks that occur against web servers
Learning Objectives
- Define web server
- ldentify possible attacks on web servers
- Define information disclosure and leakage
Performance Standards
- Students define web server
- Students identify possible attacks on web servers
- Students define information disclosure and leakage
Apply hardening techniques to Servers
Learning Objectives
- Discuss the role of security in a server environment
- Restrict settings through Group Policy Objects (GPOs)
- Implement encryption in a server environment
Performance Standards
- Students classify the role of security in a server environment
- Students identify restricting settings through Group Policy Objects (GPOs)
- Students implement encryption in a server environment
Apply hardening techniques to workstation computers
Learning Objectives
- Discuss the role of information security on a workstation
- Apply firewall rules on workstation computers
- Apply antivirus protection to workstation computers
Performance Standards
- Students identify the role of information security on a workstation
- Students apply firewall rules on workstation computers
- Students apply antivirus protection to workstation computers
Implement secure communications across a computing environment
Learning Objectives
- Discuss the role of encryption within a computing environment
- Examine virtual private networks
- Implement encryption in a server environment
Performance Standards
- Students classify the role of encryption within a computing environment
- Students identify virtual private networks
- Students implement encryption in a server environment
Build a standard operating procedure (SOP)
Learning Objectives
- Discuss the necessity for documenting procedures
- Create a procedure guide for computer security
- Examine Defense Information Systems Agency Security Technical Implementation Guides
Performance Standards
- Students classify the necessity for documenting procedures
- Students develop a procedure guide for computer security
- Students classify Defense Information Systems Agency Security Technical Implementation Guides
Manage user and administrator account privilege levels
Learning Objectives
- Distinguish between user and administrative accounts
- Control user access on a workstation computer
- Control administrative access on a server
Performance Standards
- Students identify differences between user and administrative accounts
- Students identify user’s control access on a workstation computer
- Students identify administrative’s control access on a server
|