Course Package Form 2018 Outline
Mohave Community College
CIS 156 Firewalls and Intrusion Detection


Originator: Goldberg, Andra           Status: Approved           Department: CIS Computer Information Systems
Date Created: 10/31/2014         Submitted: 11/13/2014         Completed: 12/17/2014        
Effective Semester: Fall  
Catalog Year: 2015-16  
Course Prefix: CIS  
Course Number: 156  
Course Full Title: Firewalls and Intrusion Detection  
Reason for Evaluation: Competencies Change   Course Title Change   Description Change   Prerequisite Change    
Current Credit: 3  
Lecture Hours: 3  
Lab Hours:  
Clinical Hours:  
New Credit Hours:  
Lecture Hours:  
If the credit hour change box has been marked, please provide the new credit hour:  
New Lecture Hours:  
New Lab Hours:  
New Clinical Hours:  
New Internship Hours:  
New Externship Hours:  
SUN Course?: No  
AGEC Course?: No  
Articulated?: Yes  
Transfer: ASU   NAU    
Prerequisite(s): This course requires a minimum COMPASS reading score of 70 or successful completion of PCS 021 to enroll.  
Corequisite(s): None  
Catalog Course Description: This course addresses how and why people attack computers and networks, so that technicians can be armed with the knowledge and techniques to successfully combat hackers.  
Course Learning Outcomes: 1. Differentiate between cracking and ethical hacking while recognizing the important issues related to ethical hacking.(3,5,6)
2. Develop a security policy that defines the responses to security violations and including an organization's overall security approach and reasons for performing reconnaissance. (2,3)
3. Identify different firewall configuration strategies based on the needs and desired security level of an organization.
4. Configure firewall software and hardware to authenticate and identify users and encrypt data. (6)
5. List the components and essential operations of Virtual Private Networks (VPNs) and create VPN setups such as mesh or hub-and-spoke configurations. (6)
6. Develop an Intrusion Detection System (IDS) that describes appropriate filter rules. (3,5,6)
 
Course Competencies: Competency 1 Explain the basic concepts of network security
Objective 1.1 Define the TCP/IP networking design
Objective 1.2 Describe the threats to network security
Objective 1.3 Explain the goals of network security
Objective 1.3 Outline a layered approach to network defense including scanning tools and techniques used to protect networks from sniffers
Competency 2 Describe the fundamental concepts and different approaches in analyzing risk analysis
Objective 2.1 Explain the process of risk analysis
Objective 2.2 Describe the recommended techniques to minimize risk
Objective 2.3 Describe the role that a security policy has in addressing how an organization should respond to an attack
Competency 3 Formulate a security policy and identify security policy procedures
Objective 3.1 Identify various techniques for performing reconnaissance and penetration testing
Objective 3.2 Explain the importance of ongoing risk analysis and define incident-handling
Objective 3.3 Describe the components of conducting risk assessments and security reviews including social engineering methods as a risk and security factor
Competency 4 Analyze network traffic signatures as they relate to attacks passwords
Objective 4.1 Detect normal and suspicious traffic signatures from a sample list
Objective 4.2 Explain the Common Vulnerabilities and Exposures (CVE) standard
Objective 4.3 Identify the most common attacks on passwords
Objective 4.4 Compare various programs for cracking passwords
Competency 5 Explain basic Virtual Private Network (VPN ) and proxy server concepts
Objective 5.1 Define encapsulation, encryption, and authentication in VPNs
Objective 5.2 Summarize the advantages and disadvantages of VPNs
Objective 5. 3. Compare the vulnerabilities of proxy servers with VPNs
Competency 6 Identify the components of an Intrusion Detection System (IDS)
Objective 6.1 List the appropriate steps of detecting unauthorized access to a networked system including : gathering data, sending alert messages, and automatic responses from an IDS system
Objective 6.2 Describe options for implementing intrusion detection systems
Objective 6.3 Explain what a denial-of-service (DoS) attack is and ways to prevent these types of intrusions
Competency 7 Develop protection measures for email related attacks
Objective 7.1 List the types of e-mail-related attacks
Objective 7.2 Identify three specific browser-based vulnerabilities
Objective 7.3 Identify mail related intrusion issues
Competency 8 Evaluate firewall hardware and software options
Objective 8.1 List the functions of a firewalls
Objective 8.2 Create a set of rules and restrictions for a firewall
Objective 8.3 Compare the reliability, costs, and difficulty of implementation of various hardware and software firewalls
Objective 8.4 Explain acceptable methods used to prevent buffer overflows
Competency 9 Describe the recommended procedures in firewall management to improve security of digital information
Objective 9.1 List the steps involved in managing firewalls to improve security
Objective 9.2 Describe the types of log files that most of the firewalls offer, including: security, system, traffic, active, and audit logs
Objective 9.3 Explain the parameters needed when choosing a firewall computer including the processor speed, amount of available Random Access Memory (RAM), and cache storage
Competency 10 Develop procedures to manage and improve information security
Objective 10.1 Compare the advantages and disadvantages of centralized data collection
Objective 10.2 Describe the events that require monitoring including: logins, creation of user accounts and groups, correct handling of e-mail attachments, backups, and antivirus scanning and control
Objective 10.3 Create a guide for training your security personnel to respond to security incidents and the importance of keeping informed of industry trends and innovations in the security field
Objective 10.4 Identify the emergency steps that should follow an incident

 
Document Document Name File Type
Review Document Highlighted changes of updates - 2014-11-13 20:00:36 Etc/GMT application/msword