Apr 19, 2024  
2021-2022 Archived Catalog 
    
2021-2022 Archived Catalog

COMN-224 Network Security Practices

Credits 3 / 3 Contact Hours
Pre-requisite: Placement into ACRD 080 . Pre- or Co-requisite: COMN-184. NOTE: Students must provide own storage device.
This course prepares students to assess and correct vulnerabilities present within computer networking systems. Detailed methods and tools are used in configuring and implementing control procedures for Windows and Linux operating systems. Topics may include, but are not limited to, configuration of Firewalls, Virtual Private Networks, RADIUS, and the implementation of TCP/IP protocols.

Course Outcomes
Implement security configuration parameters on network devices

Learning Objectives

  • Describe the concepts of confidentiality, integrity and availability (CIA)
  • Discuss the challenges of securing networks.
  • Differentiate appropriate network design elements and compounds

Performance Standards

  • Students classify confidentiality, integrity and availability
  • Students identify challenges in securing networks
  • Students identify appropriate network design elements and compounds

Prescribe the best practices of compliance and operational security

Learning Objectives

  • Differentiate among types of malware, and network attacks
  • Determine the appropriate mitigation and deterrent techniques
  • Analyze assessment tools and techniques to discover security threats and vulnerabilities

Performance Standards

  • Students classify types of malware and network attacks
  • Students identify appropriate mitigation and deterrent techniques
  • Students utilize tools to discover securoty threats and vulnerabilities

Incorporate controls for application, data and host security

Learning Objectives

  • Identify methods of securing the host
  • Classify types of application attacks
  • Carry out appropriate procedures to establish host security

Performance Standards

  • Students will research methods of securing host
  • Students will research and classify types of application attacks
  • Students will apply appropriate procedures to establish host security

Determine access and identity management strategies

Learning Objectives

  • Describe the fundamental concepts and best practices related to authentication, authorization and access control
  • Implement appropriate security controls when performing account management
  • Apply appropriate cryptographic tools and products

Performance Standards

  • Students identify and classify concepts and best practices related to authentication, authorization and access control
  • Students identify and implement appropriate security controls when performing account management
  • Students implement appropriate cryptographic tools and products

Examine the need for information and network security

Learning Objectives

  • Define key terms
  • Review the OSI model
  • Explore how to identify threats to information and network security

Performance Standards

  • Students will identify key terms
  • Students will identify and classify OSI model
  • Students will research and identify threats to information and network security

Determine management’s role in the development and enforcement of information security policies and guidelines

Learning Objectives

  • Identify how an organization institutionalizes policies, standards, and practices using education, training, and awareness programs
  • Discuss the need for a contingency plan using sound backup and recovery techniques
  • Discuss the need for a disaster recovery plan

Performance Standards

  • Students will research and classify organization policies, standards, and practices using education, training, and awareness programs
  • Students explain contingency plan using sound backup and recovery techniques
  • Students classify disaster recovery plan

Examine how an organization deals with network security breaches and incidents

Learning Objectives

  • Identify common system and network vulnerabilities
  • Discuss Anti-Virus selection, use, and maintenance
  • Discuss risk assessment and management

Performance Standards

  • Students classify system and network vulnerabilities
  • Students classify Anti-Virus selection, use, and maintenance
  • Students discuss risk assessment and management

Determine the need of a proxy server on a network

Learning Objectives

  • Discuss proxy servers and how they work
  • Determine when a proxy server isn’t the best choice on a network
  • Evaluate the most popular proxy-based firewall products

Performance Standards

  • Students discuss proxy servers and how they work
  • Students identify when proxy server isn’t the best choice on a network
  • Students classify popular proxy-based firewall products

Analyze the methods, goals, and implementation strategy of firewall rules used to protect a computer network

Learning Objectives

  • Define necessary incoming and outgoing traffic
  • Discuss methods to prevent unwanted traffic while allowing for external access
  • Discuss the use of IPTABLES and Access Control Lists (ACLS)

Performance Standards

  • Students identify necessary incoming and outgoing traffic
  • Students classify methods to prevent unwanted traffic while allowing for external access
  • Students explain IPTABLES and Access Control Lists (ACLS)

Examine the functions of a firewall

Learning Objectives

  • Identify what a firewall does
  • Discuss the differences between using a hardware firewall and a software firewall
  • Explore firewall rules and security

Performance Standards

  • Students explain what a firewall does
  • Students identify differences between using a hardware firewall and a software firewall
  • Students identify firewall rules and security

Explore how a firewall works

Learning Objectives

  • Create firewall rules that reflect an organization’s overall security approach
  • Identify the importance of using firewall log files to identify an incident
  • Maintain a secure wireless router for home use

Performance Standards

  • Students develop firewall rules that reflect an organization’s overall security approach
  • Students identify importance of using firewall log files to identify an incident
  • Students classify secure wireless router for home use