RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 – Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring 2004 C. Sponsoring Department: Computer Science & Educational Technology Department D. Semester Credit Hours: 3 E. Weekly Contact Hours: 4 Lecture: 2 Laboratory: 2 F. Co-requisites: CISY-229 Information Security Fundamentals CISY-253 Advanced Computer Networking G. Laboratory Fees: Yes, at current rate II. Catalog Description Co-requisites: CISY-229 Information Security Fundamentals, CISY-253 Advanced Computer Networking This course provides the student with an understanding of the security issues pertaining to the Windows operating system. Hands-on exercises performing actual operating system management reinforce what is learned in the classroom. Students learn how to implement a secure Windows environment and to monitor and maintain the network to protect from internal and external threats. III. Statement of Course Need Due to the widespread acceptance of both networking and Internet integration into most business models, and widespread personal use of high-speed internet access and home networks, many computers are now vulnerable to a wide range of malicious attacks. The widespread knowledge of this vulnerability, the low threshold of knowledge needed to exploit many of the vulnerabilities, and the funding and/or use of such attacks by many countries and special interest groups as “information warfare,” has caused a need for comprehensive security measures to be administrated on all networks. This need is being recognized by many small to medium sized businesses that until now 3/24/04 Page 1 of 5 have not had a security policy. The increase in companies of all sizes which now are engaged in web based information transfers such as e-business, data mining, and product information distribution has created a large market for security professionals. In addition to the financial risks that security breaches cause, new federal and European Union laws requiring stringent privacy requirements have created legal risks for companies with poor data security. This course will prepare students for entry-level positions in network security in the Windows environment. IV. Place of Course in College Curriculum 1. Required course for the Computer Networking Certificate Homeland Security Emphasis 2. CIS Elective 3. Free Elective for other degrees V. Outline of Course Content 1. Introduction to the networking and security aspects of Windows. y Microsoft resources - included utilities, resource kits, on-line resources, upgrades, security bulletins 2. Pre-planning Network Installation security issues y Active Directory use in controlling & segregating access y File system configuration, trade-off between fast access, data redundancy, and securing data. y RAID and backup processes 3. Windows server and client installation and security configuration 4. System Management y management tools and consoles y administrative procedures and monitoring y SNMP security y defensive hacking and system vulnerability assessments 5. Additional Security Software y firewall configuration and monitoring y anti-virus protection and monitoring y encryption software configuration and use 6. System Changes y risk analysis of upgrades and patch management basics y effects of upgrades on security system settings y adding and configuring applications including security settings y interoperability problems y change management documentation 3/24/04 Page 2 of 5 7. Account, group, and system management y configuring rights y configuring file and folder security y resource sharing 8. Remote Access and VPN security y remote access protocols and communication device configuration y VPN server policies, properties, and configuration y methods of authentication 9. Specialized server protection & access issues y email y database y file y IIS 10. Known vulnerabilities and hacking tools 11. Intrusion Detection and Remediation y developing a corporate security violation policy y legal requirements for documenting information disclosure y incident response procedures y thresholds and triggers for multiple level response procedures VI. Educational Goals and Learning Outcomes A. General Educational Goals– Students will 1. Prepare and communicate information security solutions the reflects critical and creative thought (G.E. 1, 2) 2. Use the Internet for research, information analysis, problem solving, and decision making regarding information security (G.E. 2, 3). 3. Develop the ability to make informed judgments concerning ethical issues (G.E.5) B. Student Learning Outcomes - Students will be able to: 1. Explain the comprehensive, multi-level security implementation necessary for complete Windows Operating System Security 3/24/04 Page 3 of 5 2. Identify the types of vulnerabilities of Windows, and which system components may be affected by them 3. Incorporate a Windows system security strategy into the corporate information security policy. 4. Monitor and analyze data generated by Windows management tools and consoles 5. Research appropriate resources regarding Operating System issues, software upgrades and vulnerabilities VII. Modes of Teaching and Learning y y y y y y lecture/discussion small-group work computer-assisted instruction laboratory exercises student oral presentations simulation/role playing VIII. Papers, Examinations, and other Assessment Instruments y y y y y y y laboratory products & reports weekly assignments research papers oral presentations exams and quizzes mid-term and final exams classroom participation IX. Grade Determinants 1. Laboratory products & reports- the student will be able to: y Implement practical applications of the materials presented in the classroom. y work with others in defining, evaluating, and solving problems (G.E. 1,2) 2. Weekly assignments – the student will: y develop the ability to think critically and communicate effectively (G.E. 1,2) y demonstrate a working understanding of the materials presented the previous week 3/24/04 Page 4 of 5 3. Research paper – the student will: y collect, organize and evaluate information to address different kinds of security related problems (G.E. 3) y develop the ability to think critically (G.E. 1) y analyze and synthesize information regarding an aspect of computer security, and reach conclusions about the issue 4. Oral presentations – the student will y demonstrate the ability to think critically and communicate effectively (G. E. 1,2) 5. Exams/quizzes – the student will demonstrate the ability to comprehend the Knowledge imparted in the classroom (G.E. 7) X. Texts and Materials 1. Suggested Textbooks y Hacking Exposed by Joel Scambray, Stuart McClure and George Kurtz, McGraw-Hill Professional Publishing; ISBN: 0072127481 y The CISSP Prep Guide: Mastering the Ten Domains of Computer Security by Ronald L. Krutz, Russell Dean Vines, Edward M. Stroz (Foreword), John Wiley & Sons; ISBN: 0471413569 2. On-line resources y http://www.cissp.com/default.html, the web portal for the certified information systems security professional y http://www.microsoft.com y other on-line materials as researched by students 3. Lab Tools y PGP encryption software y Zone Alarm firewall software y War Dialer automated dialing software y NMAP scanner network utility y Kaspersky and NOD anti-virus software (evaluation versions) y Windows system utilities y other freeware and shareware utilities as researched by students XI. Resources y library resources y technology support y network lab for classroom instruction XII. Honors Courses Not an honors course 3/24/04 Page 5 of 5