SYLLABUS DATE OF LAST REVIEW: 012/2016 CIP CODE: Departmental Syllabus SEMESTER: Information Assurance COURSE TITLE: CIST0225 COURSE NUMBER:

Similar documents
SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Service and Support CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST0161. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Structured Query Language (SQL)

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Networking IV CIST0250. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. CIST-0216 Networking III

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

Security+ CompTIA Certification Boot Camp

SYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS

SYLLABUS. Departmental Syllabus. Linux and Windows Practical Server. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST0147. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS CIST0252. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. CIST-0226 SQL Server

SYLLABUS. Departmental Syllabus. HTML Web Page Development. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Modern Publication Design JOUR0180. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Advanced Web Page Design. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

CompTIA Security+ (Exam SY0-401)

SYLLABUS. Departmental Syllabus. Applied Networking II. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Communication Fundamentals ELET0206. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus

Security+ SY0-501 Study Guide Table of Contents

Software Development & Education Center Security+ Certification

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Ethical Hacking and Prevention

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

CompTIA Security+ Certification


CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Curso: Ethical Hacking and Countermeasures

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

CS System Security 2nd-Half Semester Review

Course 831 Certified Ethical Hacker v9

Certified Ethical Hacker (CEH)

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

SY qa SY CompTIA Security+ Number: SY0-301 Passing Score: 800 Time Limit: 120 min File Version: 233

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

CompTIA Security+ JK0-018 Exam

Comptia.Certkey.SY0-301.v by.NATASHA.150q

Endpoint Security - what-if analysis 1

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

CompTIA Security+ (2008 Edition) Exam

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Understanding Cisco Cybersecurity Fundamentals

CompTIA Security+(2008 Edition) Exam

Certified Secure Web Application Engineer

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Network Security

Implementing Cisco Network Security (IINS) 3.0

Access Controls. CISSP Guide to Security Essentials Chapter 2

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CPTE: Certified Penetration Testing Engineer

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

CSWAE Certified Secure Web Application Engineer

CEH: CERTIFIED ETHICAL HACKER v9

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Advanced Diploma on Information Security

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Web Application Penetration Testing

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

ITSY 2330 Intrusion Detection Course Syllabus

CRN150 Fundamentals of Network Security

Comptia.Actualtests.SY0-301.v by.JustMe.587q

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

Network Security and Cryptography. December Sample Exam Marking Scheme

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

CS System Security Mid-Semester Review

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Vendor: CompTIA. Exam Code: SY Exam Name: Security+ Certification Exam 2011 version. Version: Demo

CompTIA Security+ E2C (2011 Edition) Exam.

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Most Common Security Threats (cont.)

Post-Class Quiz: Access Control Domain

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Practice Labs Ethical Hacker

Comptia SY0-401 Exam Questions & Answers

Security+ practice exam questions -----

Accounting Information Systems

Implementing Cisco Cybersecurity Operations

Bank Infrastructure - Video - 1

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

CompTIA JK CompTIA Academic/E2C Security+ Certification. Download Full Version :

Transcription:

SYLLABUS DATE OF LAST REVIEW: 012/2016 CIP CODE: 24.0101 SEMESTER: COURSE TITLE: COURSE NUMBER: Information Assurance CIST0225 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: KCKCC-issued email accounts are the official means for electronically communicating with our students. PREREQUISITES: CIST0125 Network, Operational & information Security REQUIRED TEXT AND MATERIALS: Please check with the KCKCC bookstore, http://www.kckccbookstore.com for the required text for your particular class. COURSE DESCRIPTION: This course will provide students with the required skills to implement and apply technical knowledge of security concepts. Students will gain a deep knowledge in systems access control, cryptography and systems security threads. The gained skills from this course are important for intrusion detection systems, physical access control and multi factor and many other system security issues. Students will be given real world scenarios to reinforce the material covered in this course and they will learn how to apply the learned concepts to their daily operations.

METHOD OF INSTRUCTION: A variety of instructional methods may be used depending on content area. These include but are not limited to: lecture, multimedia, cooperative/collaborative learning, labs and demonstrations, projects and presentations, speeches, debates, and panels, conferencing, performances, and learning experiences outside the classroom. Methodology will be selected to best meet student needs. COURSE OUTLINE: I. Threats and Vulnerabilities A. Types of malware. B. Various types of attacks C. Social engineering attacks and the associated effectiveness with each attack D. Wireless attacks. E. Application attacks. F. Mitigation and deterrent techniques. G. Tools and techniques to discover security threats and vulnerabilities. H. Penetration testing and vulnerability scanning. II. II. Access Control and Identity Management A. Function and purpose of authentication services B. Authentication, Authorization and Access control (AAA) C. Install and configure security controls for account management. Cryptography A. Cryptography concepts. B. Cryptographic methods. C. Public Key Infrastructure (PKI), Certificate management and associated components. EXPECTED LEARNER OUTCOMES: A. Upon completion of the course the student will be able to define types of malware. B. Upon completion of the course the student will be able to explain social engineering attacks C. Upon completion of the course the student will be able to explain wireless attacks. D. Upon completion of the course the student will be able to explain application attacks E. Upon completion of the course the student will be able to explain tools and techniques to discover security threats and vulnerabilities. F. Upon completion of the course the student will be able to explain authentication services G. Upon completion of the course the student will be able to explain the concepts of AAA. H. Upon completion of the course the student will be able to install and configure security controls for account management. I. Upon completion of the course the student will be able to explain cryptography concepts J. Upon completion of the course the student will be able to define cryptographic methods

COURSE COMPETENCIES: Upon completion of the course the student will be able to show knowledge of types of malware 1. The student shall be able to define Adware, Virus, Spyware Trojan, Rootkits & Backdoors 2. The student shall be able to define Logic bomb, Botnets Ransomware, Polymorphic malware & armored virus. 3. The student shall be able to define DDoS, Smurf attack, Spoofing, Spam, Phishing, Spim & Vishing. 4. The student shall be able to define Spear phishing, Xmas attack, Pharming, Privilege escalation & Malicious insider threat 5. The student shall be able to define DNS poisoning and ARP poisoning, Transitive access, Client-side attacks, Typo squatting/url hijacking & Watering hole attack 6. The student shall be able to define Password attacks: Brute force, Dictionary attacks, Hybrid, Birthday attacks &Rainbow tables Upon completion of the course the student will be able to show knowledge of social engineering attacks. 7. The student shall be able to explain the principles social engineering attacks 8. The student shall be able to explain Shoulder surfing, Dumpster diving & Tailgating 9. The student shall be able to explain Impersonation, Hoaxes, Whaling & Vishing Upon completion of the course the student will be able to show knowledge of wireless attacks. 10. The student shall be able to explain Rogue access points, Jamming/interference & Evil twin. 11. The student shall be able to explain War driving, Bluejacking, Bluesnarfing & War chalking. 12. The student shall be able to explain IV attack, Packet sniffing & near field communication. 13. The student shall be able to explain Replay attacks, WEP/WPA attacks& WPS attacks. Upon completion of the course the student will be able to show knowledge of application attacks. 14. The student shall be able to explain Cross-site scripting, SQL, LDAP & XML & Directory traversal/command injection. 15. The student shall be able to explain Buffer & Integer overflow, Zero-day, Cookies and attachments & Locally Shared Objects. 16. The student shall be able to explain Flash cookies, malicious add-ons, Session hijacking, Header manipulation & arbitrary code execution/remote code execution. 17. The student shall be able to explain Monitoring system logs: Event logs, Audit logs, Security logs & Access logs. 18. The student shall be able to explain Disabling unnecessary services & accounts, Protecting management interfaces and applications & Password protection. 19. The student shall be able to explain MAC limiting and filtering, 802.1x, disabling unused interfaces and unused application service ports & Rogue machine detection. 20. The student shall be able to explain Security posture: Initial baseline configuration, Continuous security monitoring & Remediation. 21. The student shall be able to explain Reporting (Alarms, Alerts & Trends) & Detection controls vs. prevention controls.

Upon completion of the course the student will be able to show knowledge of tools and techniques to discover security threats and vulnerabilities. 22. The student shall be able to explain Interpret results of security assessment tools: Protocol analyzer, Vulnerability scanner, Honeypots, Honeynets, Port scanner, Passive vs. active tools & Banner grabbing 23. The student shall be able to explain Risk calculations (Threat vs. likelihood), Assessment types (Risk, Threat &Vulnerability) & Assessment technique ( Baseline reporting, Code review, Determine attack surface, Review architecture & designs) 24. The student shall be able to explain Penetration testing: Verify a threat exists, Bypass security controls, actively test security controls & Exploiting vulnerabilities. 25. The student shall be able to explain Vulnerability scanning: Passively testing security controls, Identify vulnerability, lack of security controls & common misconfigurations, Intrusive vs. non-intrusive scanning, Credentialed vs. non-credentialed scanning & false positive. 26. The student shall be able to explain Black, White & Gray box. Upon completion of the course the student will be able to show knowledge of authentication services. 27. The student shall be able to explain RADIUS, TACACS+,Kerberos, LDAP, XTACACS, SAML & Secure LDAP Upon completion of the course the student will be able to show knowledge of the concepts of AAA. 28. The student shall be able to define Authorization: Least privilege, Separation of duties, ACLs, Mandatory access, Discretionary access, Rule & Role-based access control & Time of day restrictions. 29. The student shall be able to define Authentication: Tokens, Common access card, Smart card, Multifactor authentication, TOTP, HOTP, CHAP, PAP, Single sign-on, Access control, Implicit deny & Trusted OS. 30. The student shall be able to explain Authentication factors: Something (you are, you have, you know), somewhere you are & something you do. 31. The student shall be able to explain Identification (Biometrics, Personal identification verification card & Username). 32. The student shall be able to explain Federation & Transitive trust/authentication. Upon completion of the course the student will be able to show knowledge of installing and configuring security controls for account management. 33. The student shall be able to mitigate issues associated with users, multiple account, roles and/or shared accounts 34. The student shall be able to define Account policy enforcement: Credential management, Group policy, Password complexity, Expiration, Recovery, Disablement, Lockout, Password history, reuse & length & Generic account prohibition. 35. The student shall be able to explain Group-based privileges, User-assigned privileges, User access reviews & Continuous monitoring

Upon completion of the course the student will be able to show knowledge of cryptography concepts 36. The student shall be able to explain Symmetric vs. asymmetric, Session keys, In-band vs. out-of-band key exchange & encryption methods (Block vs. stream) 37. The student shall be able to explain Transport encryption, Non-repudiation, Hashing, Key escrow, Steganography, Digital signatures, Elliptic curve and quantum cryptography, Ephemeral key & perfect forward secrecy. Upon completion of the course the student will be able to show knowledge of cryptographic methods. 38. The student shall be able to explain Comparative strengths and performance of algorithms. 39. The student shall be able to explain Use of algorithms/protocols with transport encryption (SSL, TLS, IPSec, SSH & HTTPS) 40. The student shall be able to explain Cipher suites & Key stretching: (PBKDF2 & Bcrypt). 41. The student shall be able to explain Certificate authorities and digital certificates (CA, CRLs, OCSP & CSR). 42. The student shall be able to explain PKI, Recovery agent, Public & Private key, Registration, Key escrow & Trust models ASSESSMENT OF LEARNER OUTCOMES: Student progress is evaluated by means that include, but are not limited to, exams, written assignments, and class participation. SPECIAL NOTES: This syllabus is subject to change at the discretion of the instructor. Material included is intended to provide an outline of the course and rules that the instructor will adhere to in evaluating the student s progress. However, this syllabus is not intended to be a legal contract. Questions regarding the syllabus are welcome any time. Kansas City Kansas Community College is committed to an appreciation of diversity with respect for the differences among the diverse groups comprising our students, faculty, and staff that is free of bigotry and discrimination. Kansas City Kansas Community College is committed to providing a multicultural education and environment that reflects and respects diversity and that seeks to increase understanding. Kansas City Kansas Community College offers equal educational opportunity to all students as well as serving as an equal opportunity employer for all personnel. Various laws, including Title IX of the Educational Amendments of 1972, require the college s policy on non-discrimination be administered without regard to race, color, age, sex, religion, national origin, physical handicap, or veteran status and that such policy be made known. Kansas City Kansas Community College complies with the Americans with Disabilities Act. If you need accommodations due to a documented disability, please contact the disabilities services office at (913) 288-7664.

All enrolled students at Kansas City Kansas Community College are subject to follow all rules, conditions, policies and procedures as described in both the Student Code of Conduct as well as the Student Handbook. All Students are expected to review both of these documents and to understand their responsibilities with regard to academic conduct and policies. The Student Code of Conduct and the Student Handbook can be found on the KCKCC website.