Heartland Community College Master Course Syllabus Division name: Technology Course Prefix and number: NETW 170 Course Title: Network Security Fundamentals DATE PREPARED: 02/3/03 DATE REVISED: April 8, 2009 PCS/CIP/ID NO: 1.2-111003 IAI NO. (if available): EFFECTIVE DATE OF FIRST CLASS: August 13, 2003 CREDIT HOURS: 3 CONTACT HOURS: 4.0 LECTURE HOURS: 2.0 LABORATORY HOURS: 2.0 CATALOG DESCRIPTION: Prerequisite: NETW 124 or NETW 167 with a grade of C or better, or concurrent enrollment. The goal of this course is to provide a comprehensive overview of the network security for System Administrators, Network Administrators, and IT professionals who implement, manage and troubleshoot existing network and server environments. These skills cover an understanding of general security concepts, communication security, infrastructure security, cryptography and operational & organizational security. This course will help prepare for the CompTIA's "Security+" certification exam. TEXTBOOKS: Ciampa, Mark. Security+ Guide to Network Security Fundamentals, Third Edition. Boston, MA: Thomson Course Technology, 2009. or comparable textbook as approved by the department. RELATIONSHIP TO ACADEMIC DEVELOPMENT PROGRAMS AND TRANSFERABILITY: NETW 170 was designed to meet the specific needs of a Certificate or an Associate of Applied Science degree and not necessarily as a transfer course, particularly in relation to the Illinois Articulation Initiative. This course may transfer to various institutions in a variety of ways. Please see an academic advisor for an explanation concerning transfer options. [COURSE OBJECTIVES (Learning Outcomes) At the completion of this course, the student should be able to: Learning Assessment Outcome Tool Item 1. Explain basic networking security. 2. Compare security threat trends and their ramifications. Examination PS2 Homework Assignment 3. Explain the goals of network security. Examination 4. Explain the factors involved in a secure network strategy. Homework Assignment 5. Apply strong passwords and store them securely. Lab Assignment 6.Demonstate the Kerberos authentication process. Compentency Lab 7. Explain how CHAP works. Examination 8. Define virtualization and explain how attackers are targeting virtual systems. Homework Assignment 9. Discuss the major components used in a Ddos attack and demonstrate how they are installed. Examination 10. Discuss VPN technology and its uses for securing remote access to networks. Examination 11. Explain how protect systems from communications-based attacks. Examination 12. Explain and show how to harden operating systems. Examination & Competency Lab PS2 13. Show how IPSec works and when it is used. Competency Lab 14. Justify the need for secure e-mail. Homework Assignment COURSE/LAB OUTLINE: 1: Introduction to Security 2: System Threats and Risks 3: Protecting Systems 4: Network Vulnerabilities and Attacks 5: Network Defenses 6: Wireless Network Security 7: Access Control Fundamentals 8: Authentication 9: Performing Vulnerability Assessments 10: Conducting Security Audits 11: Basic Cryptography 12: Applying Cryptography 13: Business Continuity Planning and Procedures 14: Policies and Legislation METHOD OF EVALUATION (Tests/Exams, Grading System): Students will be evaluated by computer laboratory exercises and examinations. The lab work will include writing assignments, and performance tasks. Assignment Labs Tests Quizzes & Homework Grades A = 90% - 100 % B= 80% - 89% Percentage 20% 50% 30% 100% C= 70% - 79% D= 60% - 69% F = Below 60% REQUIRED WRITING AND READING: Required reading includes approximately a 500-page book and lab manual. Writing includes documentation of labs completed and homework as assigned.