Untitled document
Upon completion of this course, students will be able
to:
1. Examine current computer security vulnerabilities
2. Describe general computer security concepts
3. Identify operational and organizational elements central to ensuring a
secure computer system environment
4. Delineate the role of people in security
5. Evaluate the use of cryptography as a security resource
6. Analyze public key infrastructure
7. Evaluate the various standards and protocols used to secure
data transmission
8. Relate a secure physical environment to computer security
9. Include network fundamentals into the process of securing a
Local Area Network (LAN)
10. Critique system infrastructure security components
11. Solve problems involving remote access security vulnerabilities
12. Examine wireless and instant messaging technologies for the
vulnerabilities
13. Inspect network security breaches using intrusion detection systems
14. Assess security baselines for network policy implementation
Untitled document
Topics will include but not be limited to:
I. Computer security vulnerabilities
A. Identifying security problems
1. Security incidents
2. Threats to security
3. Security trends
B. Identify various avenues of attack
II. General concepts
A. Basic security terminology
1. Security basics
2. Access control
3. Authentication
B. Security models
1. Confidentiality models
2. Integrity models
III. Operational and organizational elements
A. Security operations in an organization
1. Policies, procedures, standards, and guidelines
2. The security perimeter
B. Physical security
1. Access controls
2. Physical barriers
C. Social engineering
D. Environment
E. Wireless
F. Electromagnetic eavesdropping
G. Location
IV. The role of people in security
A. People as a security problem
B. People as a security tool
V. Cryptography
A. Define algorithms
B. Hash
C. Symmetric encryption
D. Asymmetric encryption
E. Usage
1. Confidentiality
2. Integrity
3. Nonrepudiation
4. Authentication
5. Digital signatures
6. Key escrow
VI. Public key infrastructure
A. The basics of public key infrastructures
B. Certificate authorities
C. Registration authorities
D. Certificate repositories
E. Trust and certificate verification
F. Digital certificates
G. Centralized or decentralized infrastructures
H. Private key protection
I. Public certificate authorities
J. In-house certificate authorities
K. Outsourced certificate authorities
L. Certificate usage
VII. Standards and protocols used to secure network data transmission
VIII. The impact of physical security on network security
A. The problem
B. Physical security safeguards
IX. Network fundamentals
A. Network architectures
B. Network topology
C. Network protocols
D. Packet delivery
X. Infrastructure security
A. Devices
B. Media
C. Security concerns for transmission media
D. Removable media
E. Security topologies
1. Security zones
2. Virtual local area networks (VLANs)
3. Network address translation (NAT)
4. Tunneling
XI. Remote access
A. The remote access process
1. Identification
2. Authentication
3. Authorization
B. Telnet
C. Secure shell (SSH)
D. Layer 2 tunneling protocol (L2TP)
E. Point to point tunneling protocol (PPTP)
F. Institute of electric and electronics engineers (IEEE) 802.11
G. Virtual private network (VPN)
H. Internet protocol security (IPSec)
I. IEEE 802.1x
J. Remote authentication dial-in user (RADIUS)
K. Terminal access controller access control system (TACACS+)
L. Vulnerabilities
XII. Wireless and instant messaging
XIII. Intrusion detection systems
A. History of intrusion detection systems
B. Intrusion detection system (IDS) overview
C. Host-based intrusion detection systems
D. Network-based intrusion detection systems
E. Signatures
F. False positives and negatives
G. IDS models
XIV. Security baselines
A. Overview baselines
B. Password selection
1. Password policy guidelines
2. Selecting a password
3. Components of a good password
4. Password aging
C. Operating System and network operating system hardening
D. Network Hardening
E. Application Hardening
Untitled document
Reading assignments may include:
1. Online research of current security appliances and best practices
2. Topical weekly online newsletters and security reports
Homework Problems may include
1. Preparing security policies and procedures
2. Interacting online with other students to solve basic security
problems and write short reports of their proposed solutions
Other assignments may include:
1. Objective examinations and quizzes
2. Skill demonstration examinations
Untitled document
Fundamentals of Network Security by Eric Maiwald Publisher:
McGraw-Hill/Irwin Publication Date: November 2003 ISBN:0-07-223094-0
Principles of Computer Security: Security+ and Beyond by Wm. Arthur
Conklin, Gregory B. White, Chuck Cothren, Dwayne Williams, Roger L. Davis
Publisher: McGraw-Hill/Irwin Publication Date: March 2004.