(9)-Structure C Name of Course Network Security Course Code

advertisement

(9)-Structure C

1.

Name of Course

2.

Course Code

3.

4.

Name(s) of academic staff

Rationale for the inclusion of the course/module in the programme

Network Security

GSEC5014

Core Module

Network security has assumed increasing importance at this era of electronic connectivity with its viruses and hackers, electronic eavesdropping, and electronic fraud. The explosive development in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems, which made network security of a vital interest.

Semester 1 / Year 2 5.

Semester and Year offered

6.

Total Student Learning

Time (SLT)

L = Lecture

T = Tutorial

P = Practical

O= Others

7.

Credit Value

Face to Face

L

42

T

14

P

/

O

112

Total Guided and Independent Learning

Independent study=112 hours

Total =168

4

42 Hours of Lecture

14 Hours of Tutorial

None 8.

Prerequisite (if any)

9.

Objectives:

The subject is to provide a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. The subject will provide the students with the necessary understanding, knowledge, and skills to implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. Furthermore, throughout the course the students will be exposed to the current related development and research topics.

10.

Learning outcomes:

By the end of the subject, students should be able to:

 Demonstrate a deep understanding of the fundamental security concepts

Understand the network Access Control and authorized and unauthorized activities

Develop an Understanding of ACL Processing

 Understand Device Security and the Device Security Policy

 Identify the basic Security Features on Switches

 Understand Securing Layer 2 and Port-Level Traffic Controls

Develop an understanding of Layer 2 Security Best Practices

Deal with Cisco IOS Firewall

Recognize Router-Based Firewall Solution

 Recognize Cisco Firewalls: Appliance and Module

 Identify the basic elements of Attack Vectors and Mitigation Techniques

Understand Context-Based Access Control (CBAC)

Demonstrate a deep understanding Identity Security and Access Management

 Develop solid knowledge of Data Privacy, Security Monitoring, and Security Management

11.

Transferable Skills:

Literature and data searching skills

Independent study and self learning skills

Technical writing and presentation skills

Oral/Written Communication skills

Critical thinking and problem solving skills

Time and Self-management skills

Teamwork skills

Independent research skills

Analysis and decision-making skills

IT skills

12.

Teaching-learning and assessment strategy

A variety of teaching and learning strategies are used throughout the course, including:

Classroom lessons. Lectures and Power Point presentations

Tutorials

 Hands-on Laboratory Sessions

 brainstorming

 Lecturer-led problem-solving sessions

Solving assigned problems in groups and individually

 collaborative and co-operative learning;

 Independent study.

Assessment strategies include the following:

 Performance Assessment (Project, participation, Assigned exercises)

 Lecturer Observation

Quizzes, tests, and examinations

13.

Synopsis:

The subject with an easy-to-follow approach will cover most of security knowledge needed to implement end-to-end security solutions. The subject covers a great deal of the knowledge related to the Cisco network security portfolio. The subject discusses development and research topics in addition to the thirteen topics that will be introducing the fundamental security concepts, and covering identity security and access management. Data Privacy, Security

Monitoring, and Security Management will be covered as development and research topics.

14.

Mode of Delivery:

Classroom lessons. Lectures and Presentations

Tutorial sessions: Practice exercises

 Hands-on Laboratory Sessions

15.

Assessment Methods and Types:

The assessment for this course will be based on the following:

Coursework

 Midterm test

Assignment

Project

Final Examination

10%

10%

30%

Assessment

50%

50%

100%

16.

Mapping of the course/module to the Programme Aims

A1

5

A2

4

A3

3

A4

4

17.

Mapping of the course/module to the Programme Learning Outcomes

LO1

4

LO2

3

LO3

3

LO4

4

LO5

3

18.

A5

3

LO6

3

Content outline of the course/module and the SLT per topic

Details

A6

3

LO7

3

SLT

A7

2

LO8

3

L T P O

Overview of Network Security

Fundamental Questions for Network Security

Transformation of the Security Paradigm

Principles of Security—The CIA Model

Policies, Standards, Procedures, Baselines, Guidelines

Security Models

Perimeter Security

Security in Layers

Security Wheel

Access Control

Traffic Filtering Using ACLs

IP Address Overview

Subnet Mask Versus Inverse Mask Overview

ACL Configuration

Understanding ACL Processing

Types of Access Lists

Device Security

Device Security Policy

Hardening the Device

Securing Management Access for Security Appliance

Device Security Checklist

Security Features on Switches

Securing Layer 2

Port-Level Traffic Controls

Private VLAN (PVLAN)

Access Lists on Switches

Spanning Tree Protocol Features

Dynamic Host Configuration Protocol (DHCP) Snooping

IP Source Guard

Dynamic ARP Inspection (DAI)

Advanced Integrated Security Features on High-End

Catalyst Switches

Control Plane Policing (CoPP) Feature

CPU Rate Limiters

Layer 2 Security Best Practices

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

Cisco IOS Firewall

Router-Based Firewall Solution

Context-Based Access Control (CBAC)

CBAC Functions

How CBAC Works

CBAC-Supported Protocols

Configuring CBAC

IOS Firewall Advanced Features

Zone-Based Policy Firewall (ZFW)

Cisco Firewalls: Appliance and Module

Firewalls Overview

Hardware Versus Software Firewalls

Cisco PIX 500 Series Security Appliances

Cisco ASA 5500 Series Adaptive Security Appliances

Cisco Firewall Services Module (FWSM)

Firewall Appliance Software for PIX 500 and ASA 5500

Firewall Appliance OS Software

Firewall Modes

Stateful Inspection

Application Layer Protocol Inspection

Adaptive Security Algorithm Operation

Security Context

Security Levels

Redundant Interface

IP Routing

Network Address Translation (NAT)

Controlling Traffic Flow and Network Access

Modular Policy Framework (MPF)

Cisco AnyConnect VPN Client

Redundancy and Load Balancing

Firewall "Module" Software for Firewall Services

Module (FWSM)

Firewall Module OS Software

Network Traffic Through the Firewall Module

Installing the FWSM

Router/MSFC Placement

Configuring the FWSM

Attack Vectors and Mitigation Techniques

Vulnerabilities, Threats, and Exploits

Mitigation Techniques at Layer 3

Mitigation Techniques at Layer 2

Security Incident Response Framework

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

Development and research topics

Presents and discusses a set of research / development topics 3 1 0 8 12

Securing Management Access

AAA Security Services

Authentication Protocols

Implementing AAA

Configuration Examples

Cisco Secure ACS Software and Appliance

Cisco Secure ACS Software for Windows

Advanced ACS Functions and Features

Configuring ACS

Cisco Secure ACS Appliance

Multifactor Authentication

Identification and Authentication

Two-Factor Authentication System

Cisco Secure ACS Support for Two-Factor

Authentication Systems

Layer 2 Access Control

Trust and Identity Management Solutions

Identity-Based Networking Services (IBNS)

IEEE 802.1x

Deploying an 802.1x Solution

Implementing 802.1x Port-Based Authentication

Wireless LAN (WLAN) Security

Wireless LAN (WLAN)

WLAN Security

Mitigating WLAN Attacks

Cisco Unified Wireless Network Solution

Network Admission Control (NAC)

Building the Self-Defending Network (SDN)

Network Admission Control (NAC)

Cisco NAC Appliance Solution

Cisco NAC Framework Solution

Total SLT

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

3 1 0 8 12

168

19.

Main references supporting the course:

1.

Yusuf Bhaiji, “Network Security Technologies and Solutions (CCIE Professional Development Series)”. Cisco

Press, 2008.

Additional references supporting the course:

1.

William Stallings. “Network Security Essentials: Applications and Standards (4th Edition)”, Prentice Hall, 2010.

2.

William Stallings. “Cryptography and Network Security: Principles and Practice (5th Edition)”. Prentice Hall,

2010.

3.

Ross J. Anderson. “Security Engineering: A Guide to Building Dependable Distributed Systems”, Wiley, 2008.

4.

Gary McGraw. “Software Security: Building Security In”, Addison-Wesley Professional, 2006.

20.

Other additional information

All materials will be available to the students online.

Download