ITSY 2430 — Intrusion Detection Del Mar College — Fall 2010

advertisement
ITSY 2430 — Intrusion Detection
Del Mar College — Fall 2010
SYLLABUS
General Course Information
Instructor:
Office:
Office Hours:
Phone:
E-mail:
Web site:
Classroom:
Class Times:
Prerequisites:
Prof. Michael P. Harris, CCNA, CCAI
VB114
MWF 9:00-10:00, TTh 2:00-3:00
(361) 698-1299
mailto:[email protected]
academy.delmar.edu/Courses/ITSY2430
VB177
12:00-1:50pm
ITSY2400, ITSY2401
Textbook: Mark Ciampa, Security+ Guide to Network Security Fundamentals.
Course Technology Incorporated, 2009, ISBN 13: 978-1-4283-4066-4
Course Objectives
This course is a comprehensive guide for anyone wishing to take the CompTIA
Security+ exam. The course covers all of the new CompTIA Security+ exam objectives
and maps to the new Security+ 2008 exam. The course covers newly covered exam
topics including cross site scripting, SQL injection, rootkits, and virtualization, as well
as topics of increasing importance in the industry as a whole, like the latest breeds of
attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.
Specific topic coverage includes:
 Introduction to Security
 System Threats and Risks
 Protecting Systems
 Network Vulnerabilities and Attacks
 Network Defenses
 Wireless Network Security
 Access Control Fundamentals
 Authentication
 Performing Vulnerability Assessments
 Conducting Security Audits
 Basic Cryptography
 Applying Cryptography
 Business Continuity Planning and Procedures
 Policies and Legislation
ITSY 2430 – Intrusion Detection
Syllabus
Web Site
Supplementary information for the course is available at:
academy.delmar.edu/Courses/ITSY2430
The Web site contains class notes,
Labs, Handouts, PowerPoint slides, class announcements, the course syllabus, test
dates, and other information for the course.
E-Mail
All students are requested to obtain an e-mail account. If you have any questions
about the course or need assistance, please contact me in person or by telephone
during office hours; or by e-mail at any time. Also, you may submit the end-ofchapter case project assignments in class on the due date or by e-mail with a date
stamp at or before 5:00 P.M. on the due date. E-mail submissions should be submitted
as an attachment in Microsoft Word format.
14-Week Course Outline
Week
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Chapter
Readings
Topics
Introduction to Security
System Threats and Risks
Protecting Systems
Network Vulnerabilities and Attacks
Network Defenses
Wireless Network Security
Access Control Fundamentals
Authentication
Performing Vulnerability Assessments
Conducting Security Audits
Basic Cryptography
Applying Cryptography
Business Continuity
Security Policies and Training
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Security+ Guide to Network Security Fundamentals 3rd Edition
Exams
Mid-term Exam
Final Exam
Page 2
Download