2021-2022 Archived Catalog
|
COMN-224 Network Security PracticesCredits 3 / 3 Contact Hours Pre-requisite: Placement into ACRD 080 . Pre- or Co-requisite: COMN-184. NOTE: Students must provide own storage device. This course prepares students to assess and correct vulnerabilities present within computer networking systems. Detailed methods and tools are used in configuring and implementing control procedures for Windows and Linux operating systems. Topics may include, but are not limited to, configuration of Firewalls, Virtual Private Networks, RADIUS, and the implementation of TCP/IP protocols.
Course Outcomes Implement security configuration parameters on network devices
Learning Objectives
- Describe the concepts of confidentiality, integrity and availability (CIA)
- Discuss the challenges of securing networks.
- Differentiate appropriate network design elements and compounds
Performance Standards
- Students classify confidentiality, integrity and availability
- Students identify challenges in securing networks
- Students identify appropriate network design elements and compounds
Prescribe the best practices of compliance and operational security
Learning Objectives
- Differentiate among types of malware, and network attacks
- Determine the appropriate mitigation and deterrent techniques
- Analyze assessment tools and techniques to discover security threats and vulnerabilities
Performance Standards
- Students classify types of malware and network attacks
- Students identify appropriate mitigation and deterrent techniques
- Students utilize tools to discover securoty threats and vulnerabilities
Incorporate controls for application, data and host security
Learning Objectives
- Identify methods of securing the host
- Classify types of application attacks
- Carry out appropriate procedures to establish host security
Performance Standards
- Students will research methods of securing host
- Students will research and classify types of application attacks
- Students will apply appropriate procedures to establish host security
Determine access and identity management strategies
Learning Objectives
- Describe the fundamental concepts and best practices related to authentication, authorization and access control
- Implement appropriate security controls when performing account management
- Apply appropriate cryptographic tools and products
Performance Standards
- Students identify and classify concepts and best practices related to authentication, authorization and access control
- Students identify and implement appropriate security controls when performing account management
- Students implement appropriate cryptographic tools and products
Examine the need for information and network security
Learning Objectives
- Define key terms
- Review the OSI model
- Explore how to identify threats to information and network security
Performance Standards
- Students will identify key terms
- Students will identify and classify OSI model
- Students will research and identify threats to information and network security
Determine management’s role in the development and enforcement of information security policies and guidelines
Learning Objectives
- Identify how an organization institutionalizes policies, standards, and practices using education, training, and awareness programs
- Discuss the need for a contingency plan using sound backup and recovery techniques
- Discuss the need for a disaster recovery plan
Performance Standards
- Students will research and classify organization policies, standards, and practices using education, training, and awareness programs
- Students explain contingency plan using sound backup and recovery techniques
- Students classify disaster recovery plan
Examine how an organization deals with network security breaches and incidents
Learning Objectives
- Identify common system and network vulnerabilities
- Discuss Anti-Virus selection, use, and maintenance
- Discuss risk assessment and management
Performance Standards
- Students classify system and network vulnerabilities
- Students classify Anti-Virus selection, use, and maintenance
- Students discuss risk assessment and management
Determine the need of a proxy server on a network
Learning Objectives
- Discuss proxy servers and how they work
- Determine when a proxy server isn’t the best choice on a network
- Evaluate the most popular proxy-based firewall products
Performance Standards
- Students discuss proxy servers and how they work
- Students identify when proxy server isn’t the best choice on a network
- Students classify popular proxy-based firewall products
Analyze the methods, goals, and implementation strategy of firewall rules used to protect a computer network
Learning Objectives
- Define necessary incoming and outgoing traffic
- Discuss methods to prevent unwanted traffic while allowing for external access
- Discuss the use of IPTABLES and Access Control Lists (ACLS)
Performance Standards
- Students identify necessary incoming and outgoing traffic
- Students classify methods to prevent unwanted traffic while allowing for external access
- Students explain IPTABLES and Access Control Lists (ACLS)
Examine the functions of a firewall
Learning Objectives
- Identify what a firewall does
- Discuss the differences between using a hardware firewall and a software firewall
- Explore firewall rules and security
Performance Standards
- Students explain what a firewall does
- Students identify differences between using a hardware firewall and a software firewall
- Students identify firewall rules and security
Explore how a firewall works
Learning Objectives
- Create firewall rules that reflect an organization’s overall security approach
- Identify the importance of using firewall log files to identify an incident
- Maintain a secure wireless router for home use
Performance Standards
- Students develop firewall rules that reflect an organization’s overall security approach
- Students identify importance of using firewall log files to identify an incident
- Students classify secure wireless router for home use
|