Вы находитесь на странице: 1из 5

Other Course Information ITSY 2401 FIREWALLS AND NETWORK SECURITY SUMMER, 2012

Section Number: Room Number: Class Days/Hours: Instructor: Email: Office: Phone:

5420/9000 INET MTWRFSU, TBA MS. CHRISTINE SCHUBERT-LOGUE cschubert@dcccd.edu A427 (214) 860-2363

El Centro College SCANS Statement Explanation The following table illustrates how the course specific learning outcomes provide mastery of foundation skills and workplace competencies. COURSE OUTCOME Demonstrate system security skills through firewall, implementation and testing; use system tools, practices, and relevant technologies to implement a security plan; evaluate practices, tools, and technologies to identify security breaches, sources of attacks, and protect mission critical systems; establish an appropriate level of security based on an analysis of security logs; and use relevant tools to secure a network, respond to and follow up on various types of attacks.
SCANS 3a,3b,3c,4b,4c,4d,5a,5b, Sc,6a,6d,6e,7a7b,7c,7d,7f 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c,7d,7e,7f 3a,3b,3c,4c,4,d,6a,6e,7a,7e, 7d,7c,7b,7f 3a,3b,3c,4b,4c,4d,5a,5b, 5c,6a,6d,6e,7a7b,7c,7d, 7f, 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c,7d,7e,7f 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7f 3a,3b,3c,4b,4c,4d,5a,Sb, 5c,6a,6d,6e,7a7b,7c,7d, 71 LEARNING OUTCOMES Discuss firewall planning and design, terminology, purpose, type of firewalls, Explain the need for a security policy Discuss what is a security policy Explain the seven steps to building a security policy Identify firewall configuration strategies Discuss the different firewall configurations. Explain packets and packet filtering. Discuss specific packet filter rules Discuss different aspects of authentication users Identify the role of major password security issues Discuss why firewalls need to use encryption Describe digital certificates and public and private keys. EVALUATION Tests, Homework, Labs Tests, Homework, Labs Test, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

SCANS 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c,7d,7e,7f 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7f 3a,3b,3c,4b,4c,4d,5a,5b, 7c,6a,6d,6e,7a7b,7c,7d, 7f 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e

LEARNING OUTCOMES Describe the process of choosing a bastion host. Explain the configuration of a bastion host. Describe VPN components and operations. Discuss tunneling protocols used with VPNs. Outline the process of building your own firewall. Describe the process of choosing a bastion host. Discuss making your firewall meet your needs by identifying new risks. Discuss different aspects of security breaches and use of intrusion detection systems. Describe the process of choosing a bastion host.

EVALUATION Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

COMPUTATION OF FINAL GRADE Student progress will be evaluated by the following means: Lecture Book Quizzes Midterm Exam Final Exam Attendance/Discussions Real World Exercises Hands-On Projects Running Case Study Projects Total Points 100 100 100 100 200 200 200 1000 Grade Evaluation: A= 90% - 100% = 900-1000 pts B= 89% - 80% = 800-899 pts C= 79% - 70% = 700-799 pts D= 69% - 60% = 600-699 pts F= 59% or below = 599- 0 pts

INCOMPLETE GRADE STATEMENT Incomplete grades are given only in case of an emergency and at least 50% of the course requirements must have been completed. Request for an incomplete grade must be justified through a written statement and presented to your instructor who will decide if your request can be approved. CONTINUING EDUCATION STUDENTS MUST COMPLETE ALL PROJECTS AND TESTS IN ORDER TO RECEIVE A CEU AWARD.

COURSE OUTLINE Although the course is self-paced, each instructor will provide a schedule listing a suggested guide to follow in order to insure that all course requirements are completed by the end of the course. The instructor may alter this course outline at any time due to time constraints, loss of school days, or unforeseen problems with computer equipment, labs, etc COURSE OUTLINE Firewalls and Network Security ITSY 2401 Assignments due each week by Sunday night at 11:00 pm. (10 Points will be deducted for each day late.)

Week 1

Date 6/06-6/10

Chapter-Lecture Book 1. Introduction to Information Security

Lecture Book Assignments 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit

Running Case ProjectsCapstone for Course Submit Student Tasks in the Running Case Project located at the end of the chapter

Lecture Book Exams

6/11-6/17

2. Security Policies and Standards

1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit

Submit Student Tasks in the Running Case Project located at the end of the chapter

6/18-6/24

3. Authenticating Users 4. Introduction to Firewalls

1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit

Submit Student Tasks in the Running Case Project located at the end of the chapter

Week 4

Date 6/25-7/01

Chapter-Lecture Book 5. Packet Filtering

Lecture Book Assignments 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit 1. Chapter Quiz 2. Discussion Question 3. Real World Exercise- Pick 2 and submit 4. Hands-On ProjectsPick 1 and submit

Running Case ProjectsCapstone for Course Submit Student Tasks in the Running Case Project located at the end of the chapter

Lecture Book Exams

7/02-7/08

6. Firewall Configuration and Administration

Submit Student Tasks in the Running Case Project located at the end of the chapter

MidtermChapters 1-5 by 7/08

7/09-7/15 7. Working with Proxy Servers and applicationLevel Firewalls

Submit Student Tasks in the Running Case Project located at the end of the chapter

7/16-7/22

8. Implementing the Bastion Host

Submit Student Tasks in the Running Case Project located at the end of the chapter

7/23-7/29

9. Encryption-The Foundation for the Virtual private Network

Submit Student Tasks in the Running Case Project located at the end of the chapter

730-8/05

10. Setting Up a Virtual Private Network

Submit Student Tasks in the Running Case Project located at the end of the chapter

Week 10

Date 8/06-8/09

Chapter-Lecture Book All Assignments, Labs, Projects, and Exams due

Lecture Book Assignments

Running Case ProjectsCapstone for Course

Lecture Book Exams Final ExamChapters 6-10 by 8/09

COMPUTER CENTER HOURS OF OPERATION