Originator: | Goldberg, Andra Status: Approved Department: CIS Computer Information Systems | |
Date Created: | 10/31/2014 Submitted: 11/13/2014 Completed: 12/17/2014 | |
Effective Semester: | Fall | |
Catalog Year: | 2015-16 | |
Course Prefix: | CIS | |
Course Number: | 156 | |
Course Full Title: | Firewalls and Intrusion Detection | |
Reason for Evaluation: | Competencies Change Course Title Change Description Change Prerequisite Change | |
Current Credit: | 3 | |
Lecture Hours: | 3 | |
Lab Hours: | ||
Clinical Hours: | ||
New Credit Hours: | ||
Lecture Hours: | ||
If the credit hour change box has been marked, please provide the new credit hour: | ||
New Lecture Hours: | ||
New Lab Hours: | ||
New Clinical Hours: | ||
New Internship Hours: | ||
New Externship Hours: | ||
SUN Course?: | No | |
AGEC Course?: | No | |
Articulated?: | Yes | |
Transfer: | ASU NAU | |
Prerequisite(s): | This course requires a minimum COMPASS reading score of 70 or successful completion of PCS 021 to enroll. | |
Corequisite(s): | None | |
Catalog Course Description: | This course addresses how and why people attack computers and networks, so that technicians can be armed with the knowledge and techniques to successfully combat hackers. | |
Course Learning Outcomes: | 1. Differentiate between cracking and ethical hacking while recognizing the important issues related to ethical hacking.(3,5,6)
2. Develop a security policy that defines the responses to security violations and including an organization's overall security approach and reasons for performing reconnaissance. (2,3) 3. Identify different firewall configuration strategies based on the needs and desired security level of an organization. 4. Configure firewall software and hardware to authenticate and identify users and encrypt data. (6) 5. List the components and essential operations of Virtual Private Networks (VPNs) and create VPN setups such as mesh or hub-and-spoke configurations. (6) 6. Develop an Intrusion Detection System (IDS) that describes appropriate filter rules. (3,5,6) |
|
Course Competencies: | Competency 1 Explain the basic concepts of network security
Objective 1.1 Define the TCP/IP networking design Objective 1.2 Describe the threats to network security Objective 1.3 Explain the goals of network security Objective 1.3 Outline a layered approach to network defense including scanning tools and techniques used to protect networks from sniffers Competency 2 Describe the fundamental concepts and different approaches in analyzing risk analysis Objective 2.1 Explain the process of risk analysis Objective 2.2 Describe the recommended techniques to minimize risk Objective 2.3 Describe the role that a security policy has in addressing how an organization should respond to an attack Competency 3 Formulate a security policy and identify security policy procedures Objective 3.1 Identify various techniques for performing reconnaissance and penetration testing Objective 3.2 Explain the importance of ongoing risk analysis and define incident-handling Objective 3.3 Describe the components of conducting risk assessments and security reviews including social engineering methods as a risk and security factor Competency 4 Analyze network traffic signatures as they relate to attacks passwords Objective 4.1 Detect normal and suspicious traffic signatures from a sample list Objective 4.2 Explain the Common Vulnerabilities and Exposures (CVE) standard Objective 4.3 Identify the most common attacks on passwords Objective 4.4 Compare various programs for cracking passwords Competency 5 Explain basic Virtual Private Network (VPN ) and proxy server concepts Objective 5.1 Define encapsulation, encryption, and authentication in VPNs Objective 5.2 Summarize the advantages and disadvantages of VPNs Objective 5. 3. Compare the vulnerabilities of proxy servers with VPNs Competency 6 Identify the components of an Intrusion Detection System (IDS) Objective 6.1 List the appropriate steps of detecting unauthorized access to a networked system including : gathering data, sending alert messages, and automatic responses from an IDS system Objective 6.2 Describe options for implementing intrusion detection systems Objective 6.3 Explain what a denial-of-service (DoS) attack is and ways to prevent these types of intrusions Competency 7 Develop protection measures for email related attacks Objective 7.1 List the types of e-mail-related attacks Objective 7.2 Identify three specific browser-based vulnerabilities Objective 7.3 Identify mail related intrusion issues Competency 8 Evaluate firewall hardware and software options Objective 8.1 List the functions of a firewalls Objective 8.2 Create a set of rules and restrictions for a firewall Objective 8.3 Compare the reliability, costs, and difficulty of implementation of various hardware and software firewalls Objective 8.4 Explain acceptable methods used to prevent buffer overflows Competency 9 Describe the recommended procedures in firewall management to improve security of digital information Objective 9.1 List the steps involved in managing firewalls to improve security Objective 9.2 Describe the types of log files that most of the firewalls offer, including: security, system, traffic, active, and audit logs Objective 9.3 Explain the parameters needed when choosing a firewall computer including the processor speed, amount of available Random Access Memory (RAM), and cache storage Competency 10 Develop procedures to manage and improve information security Objective 10.1 Compare the advantages and disadvantages of centralized data collection Objective 10.2 Describe the events that require monitoring including: logins, creation of user accounts and groups, correct handling of e-mail attachments, backups, and antivirus scanning and control Objective 10.3 Create a guide for training your security personnel to respond to security incidents and the importance of keeping informed of industry trends and innovations in the security field Objective 10.4 Identify the emergency steps that should follow an incident |
Document | Document Name | File Type |
---|---|---|
Review Document | Highlighted changes of updates - 2014-11-13 20:00:36 Etc/GMT | application/msword |