Network Security Revised-Eric

Embed Size (px)

Citation preview

  • 7/30/2019 Network Security Revised-Eric

    1/3

    1

    SECUNET Syllabus

    I. COURSE IDENTIFICATION

    Course Title Basic Network Security

    Course Credit 3 UNITS

    CoursePrerequisite

    Advanced Networking Concepts

    CourseCorequisite

    None

    CourseDescription

    The course covers the fundamentals of network security. The extent of coverage is confinedto the concepts necessary to provide the students with a good working knowledge innetwork security. Appropriate hacking tools and security tools will be utilized to supplementand complement the different network security concepts discussed.

    II. COURSE OBJECTIVES

    General Objective To introduce the basic concepts of network security to BSIT students.

    Specific Objectives At the end of the course, the students should be able to:

    1. Aware of the basic security management concepts.2. The difference between policies, standards, guidelines, and procedures.3. Determine the level of threat provided by the intruders.4. Explain the ways and good practices of network security.5. Understand some laws pertaining to cyber crimes.6. Differentiate the level of security and weaknesses in each network.7. Name network attacks and vulnerabilities.8. Use some methods of testing for network vulnerabilities.9. Use some hacking prevention techniques.10. Understand the Information Technology Infrastructure Library11. Document company IT Use Policies

    III. TEXTBOOK(S) AND REFERENCESTextbook(s) Maiwald, Eric. (2004). Fundamentals of Network Security. Illinois: McGrw-Hill Co.

    References Carr, Houston H. And Charles A. Snyder. (2007). Data Communications and NetworkSecurity. International Edition. New York: McGraw-Hill Co.

    Stewart, James, Tittel, Ed and Chapple, Mike. (2008). Certified Information SystemsSecurity Professional Study Guide. Fourth Edition. Indiana: Wiley Publishing Inc.Russell, Ryan. (2002). Hack Proofing Your Network. 2

    ndEdition. Massachussetts: Syngress

    Publishing, Inc.Article: Information Technology Infrastructure Library(January 2011),

    http://en.wikipedia.org/wiki/ITIL

    IV. COURSE OUTLINE

    Week Modules Hours

    1 Module 1 Orientation: Review of Course Syllabus

    Chapter 1 Security Management Practices

    Module 2 Information Security Triad C.I.A(Confidentiality, Integrity, Availability)

    Module 3 - Security and Information Risk Management

    Module 4 Network System Monitoring

    4.0

    2 Chapter 2 Access Control Systems

    Module 5 Identity Management

    Module 6

    Authentication (Biometrics and Passwords)Module 7 Access Control Models

    4.0

    3 Chapter 3 Telecommunications and Network Security

    Module 8 Remote Access Security Management

    Module 9 Intrusion Detection and Response

    Long Exam 1

    4.0

    4 Module 10 Back Up Concepts and Methods 4.0

    Information Technology Education Department (ITE)

  • 7/30/2019 Network Security Revised-Eric

    2/3

    2

    Module 11 - Single Point of Failures

    Module 12 Network Attacks and Abuses

    5 Chapter 4 Layered Architecture Model and Firewall Concepts

    Module 13 Securing Computer System

    Module 14 OSI Security Service and Management

    Module 15 Firewall Architectures

    4.0

    6 Chapter 5 Cryptography

    Module 16 Cryptography Concepts

    Module 17 Cryptography History

    Module 18 Symmetric and Asymmetric Cryptography

    Module 19 Encryption Modes

    4.0

    7 Film Showing Hackers WantedLong Quiz 3

    4.0

    8 Chapter 6Security Architecture

    Module 20 System Security Architecture

    Module 21 System Security models

    Module 22 Security Modes of Operation

    4.0

    9 Module 23 Understanding Information Technology Infrastructure Library 4.0

    10 Chapter 7 - Business Continuity Planning and Disaster Recovery Planning

    Module 24 Business Continuity Planning

    Module 25 Disaster Recovery Management

    Module 26 - Electronic Vaulting and Remote Journaling

    4.0

    11 Chapter 8 Physical Environmental Security

    Module 27 Physical Security Fundamentals

    Module 28 Environmental Issues and Practices

    4.0

    12 Cyber Crimes and Other Legal Stuff

    Module 29 Complexities in Cyber Crimes

    Module 30 International Protection of Property

    Module 31- Computer Fraud and Abuse

    4.0

    13 Module 32 Employee Privacy Issues and Computer Forensic Investigation

    Module 33 IT Use Policies

    4.0

    14 Final Examination 2.0

    Total Numbers of Hours 54.0

    V. COURSE REQUIREMENTS

    Lectures and class discussionsShort QuizzesAssignments, Recitations, Seat worksLaboratory ExercisesPractical ExamsLong exams/quizzesMidterm ExamFinal examFrequency of meetings: 4 hrs/week

  • 7/30/2019 Network Security Revised-Eric

    3/3

    3

    VI. GRADING SYSTEM

    1. Average of at least three long exams/quizzes/practical 30%2. Final Examination 25%3. Midterm Examination 15%4. Short Quizzes/Assignments/Recitation/Seatworks 10%5. Laboratory Exercises 15%6. Teachers Evaluation 5%

    Final Grade Total 100% (Passing Mark: 70%)

    VII. INSTRUCTOR AND SCHEDULE INFORMATION

    Name: ________________________________

    Office: +632 736-0015 to 19 loc. ___________Home: ________________________________

    Mobile number: ________________________Email: ________________________________

    Consultation Hours: ____________________________

    Meeting Place and time:

    SY: _______________ Term: _____

    Room: _______Day and Time: ____________________________

    VIII. VERSION

    Version 1.15Modified on: September 10, 2011By: Eric Navarro