ITT Technical Institute. IS3445 Security for Web Applications and Social Networking Onsite Course SYLLABUS

Similar documents
ITT Technical Institute. IS4560T Hacking and Countermeasures Onsite Course SYLLABUS

ITT Technical Institute. IS3120 Network Communications Infrastructure Onsite Course SYLLABUS

IS415T System Forensics Investigation and Response [Onsite]

ITT Technical Institute. IS3220 Information Technology Infrastructure Security Onsite Course SYLLABUS

ITT Technical Institute. IS3440T Linux Security Onsite Course SYLLABUS

IS418 Securing Linux Platforms and Applications [Onsite]

IS317 Hacker Techniques, Tools and Incident Handling [Onsite and Online]

IS305 Managing Risk in Information Systems [Onsite and Online]

ITT Technical Institute. IT360 Networking Security I Onsite Course SYLLABUS

IS404T Access Control, Authentication and Public Key Infrastructure (PKI) [Onsite]

IS316 Fundamentals of Network Security, Firewalls and VPNs [Onsite and Online]

ITT Technical Institute. NT1430 Linux Networking Onsite Course SYLLABUS

ITT Technical Institute. NT1230T Client-Server Networking I Onsite Course SYLLABUS

ITT Technical Institute. NT2640 IP Networking Onsite Course SYLLABUS

ITT Technical Institute. ET385 Data and Network Communications Onsite Course SYLLABUS

ITT Technical Institute. ET3110 Networking and Communications Onsite and Online Course SYLLABUS

ITT Technical Institute. PT2520T Database Concepts Onsite Course SYLLABUS

ITT Technical Institute. ET4560T C++ Programming Onsite Course SYLLABUS

ITT Technical Institute. NT1330 Client-Server Networking II Onsite Course SYLLABUS

ITT Technical Institute. IT203 Database Development Onsite Course SYLLABUS

ITT Technical Institute. GC2630 Graphic Design for the Web Onsite Course SYLLABUS

ITT Technical Institute. ET3430 Fiber Optic Communications Onsite Course SYLLABUS

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS

ITT Technical Institute. SD2720 Advanced Software Development Using Java Onsite and Online Course SYLLABUS

ITT Technical Institute. SD1240T Creating Websites Using HTML and CSS Onsite and Online Course SYLLABUS

ITT Technical Institute. TB143 Introduction to Personal Computers Onsite and Online Course SYLLABUS

ITT Technical Institute. SD3120T Programming in Open Source with LAMP Onsite and Online Course SYLLABUS

ITT Technical Institute. SD1420 Introduction to Java Programming Onsite and Online Course SYLLABUS

ITT Technical Institute. SD3240T Creating Websites in the LAMP Environment Onsite and Online Course SYLLABUS

ITT Technical Institute. DT2630 3D Modeling and Visualization Onsite and Online Course SYLLABUS

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

ITT Technical Institute. CS420 Application Security Onsite Course SYLLABUS

ITT Technical Institute. ET2640 Microprocessors and Microcontrollers Onsite and Online Course SYLLABUS

ITT Technical Institute. ET2560T Introduction to C Programming Onsite and Online Course SYLLABUS

ITT Technical Institute. IT370 Advanced Routing and Switching I Onsite Course SYLLABUS

ITT Technical Institute. IT412 Voice and Data Integration Onsite Course SYLLABUS

ITT Technical Institute. SD1420 Introduction to Java Programming Onsite Course SYLLABUS

ITT Technical Institute. SD2520 Introduction to Database and XML with jquery Onsite and Online Course SYLLABUS

ISM 324: Information Systems Security Spring 2014

ITT Technical Institute. IT321 Network Technology and Service Integration Onsite Course SYLLABUS

ITT Technical Institute. IT371 Advanced Routing and Switching II Onsite Course SYLLABUS

IT109P Microsoft Desktop Operating System [Onsite]

IT221T Microsoft Network Operating System I [Onsite]

ITT Technical Institute. IT302 Linux System Administration Onsite Course SYLLABUS

ITT Technical Institute. NT1210 Introduction to Networking Onsite Course SYLLABUS

ET225P Networking Concepts [Onsite]

ITT Technical Institute. SD3440T Creating Websites Using ASP.NET Onsite and Online Course SYLLABUS

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS HPC INTERNETWORKING & GRID TECHNOLOGY HPC 1020

Standard Course Outline IS 656 Information Systems Security and Assurance

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS HPC INTERNETWORKING & GRID TECHNOLOGY HPC 1020

ITT Technical Institute. IT220T Network Standards and Protocols Onsite Course SYLLABUS

CCNA Cybersecurity Operations 1.1 Scope and Sequence

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS CIW JAVASCRIPT FUNDAMENTALS CERTIFICATION WEB 2391

SI - Computer Security

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS ROUTING/SWITCH CONFIGURATION CSIT 2750

ITSY Information Technology Security Course Syllabus Spring 2018

Lab #1 Creating an IT Infrastructure Asset List and. Identifying Where Privacy Data Resides

CCNA Cybersecurity Operations. Program Overview

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX ADVANCED SYSTEM & NETWORK ADMINISTRATION CSIT 2475

Division of Engineering, Computer Programming, and Technology

MWF 9:00-9:50AM & 12:00-12:50PM (ET)

Fire Fighting Practices Level 1 and 2 FIRE 127 Fire Training Certification. Course Outline

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358

ITT Technical Institute. IT217P Programming in C++ II Onsite Course SYLLABUS

INFS 2150 (Section A) Fall 2018

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline Routing and Switching Essentials [CISCO 2] ISS 112

Scope and Sequence: CCNA Discovery

Student Lab Manual. Student Lab Manual. Network Communications Infrastructure IS3120

ITSY 2330 Intrusion Detection Course Syllabus

ITT Technical Institute. CS330 Database Design and Implementation Onsite Course SYLLABUS

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

ITCC112. Course Summary. Description. Objectives

Industrial Fire Brigade Member - Incipient FIRE 123 Fire Training Certification. Course Outline

COURSE NUMBER: ISS 214 COURSE NAME: Connecting Networks - Cisco 4 SEMESTER CREDIT HOURS: 4.

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

ITT Technical Institute. VC130P Digital Type and Image Manipulation Onsite Course SYLLABUS

COBIT 5 Implementation

Descriptions for CIS Classes (Fall 2017)

OVERVIEW OF SUBJECT REQUIREMENTS

ITT Technical Institute. IT390 Business Database Administration Onsite Course SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.

TRAINING CURRICULUM 2017 Q2

Information and Communication Technology BCcampus Online Collaborative Program

Computer Science Technology Houston Community College

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

CSCO 220 CCNA Scaling Networks Spring 2018

ITT Technical Institute. CS120 Programming in Visual Basic Onsite Course SYLLABUS

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT

Instructor: Eric Rettke Phone: (every few days)

CSCO 121 CCNA Routing and Switching Essentials Spring 2018

Transcription:

ITT Technical Institute IS3445 for Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT640 IP Networking or equivalent Course Description: In this course, students will analyze security implications of information exchange on the Internet and via -based applications. Topics include methods and techniques to identify and countermeasure risks, threats and vulnerabilities for -based applications, and to mitigate risks associated with applications and social networking.

for Networking Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: 1 Date: 1/9/01

for Networking IS4799 ISC Capstone Project IS4670 Cybercrime Forensics IS4680 Auditing for Compliance IS4560 Hacking and Countermeasures IS4550 Policies and Implementation IS3445 for Networking IS3350 Issues in Legal Context IS330 Access IS3340 Windows IS3440 Linux IS3110 Risk Management in Information Technology IS310 Network Communications Infrastructure IS30 IT Infrastructure PM3110 Introduction to Project Management NT580 Introduction to Information NT799 NSA Capstone Project NT1430 Linux Networking NT640 IP Networking MS3110 Statistics SS3150 Research Methods EN30 Written Analysis SP3450 Psychlogy HU4640 Ethics SC4730 Environmental Science EN130 Composition I EN140 Composition II MA110 College Mathematics I Information Courses Prerequisites from Lower- Division General Education/ General Studies Date: 1/9/01

for Networking Course Summary Major Instructional Areas 1. Internet, applications, social media, and social networking in business. -based risks 3. Secure coding practices 4. Auditing, compliance, and quality assurance for applications 5. application security Course Objectives 1. Analyze the impact of the Internet and applications on the business world.. Analyze the evolution of social media and social networking. 3. Compare and contrast -based risks. 4. Analyze common site attacks, weaknesses, and security best practices. 5. Describe the attributes and qualities of secure coding practices. 6. Analyze the role and importance of audit and compliance to application security. 7. Analyze the role and importance of quality assurance testing for applications. 8. Explain the value and importance of vulnerability and security assessments for applications. 9. Evaluate next-generation challenges in securing applications and data. 10. Construct a comprehensive lifecycle approach to application security. 3 Date: 1/9/01

for Networking Learning Materials and References Required Resources Textbook Package New to this Course Carried over from Previous Course(s) Required for Subsequent Course(s) Harwood, Mike. Applications and Networking. 1 st ed. Sudbury, MA: Jones & Bartlett, 011. Printed IS3445 Student Lab Manual ISS Mock IT Infrastructure (1) Cisco Core Backbone Network consisting of Cisco 811 routers, 950/960 catalyst switches, ASA 5505s for classroom equipmentbased labs that require a live, IP network. (For onsite only) ISS Mock IT Infrastructure () VM Server Farm ( Microsoft Windows Servers and Ubuntu Linux Servers) for classroom equipment-based VM labs. (For both onsite and online) ISS Mock IT Infrastructure () VM Workstation (Microsoft Windows XP Professional Workstation with Core ISS Apps and Tools) for classroom equipment-based VM labs. (For both onsite and online) (1) The following presents the core ISS Cisco core backbone network components needed for some of the equipment-based labs for onsite delivery only. (Note: video labs will be used for online delivery): Cisco 811 Routers Cisco 950/960 Catalyst Switches Cisco ASA 5505 Appliances Simulated WAN Infrastructure EGP using BGP4 or IGP using EIGRP Layer Switching with VLAN Configurations Telnet and SSH version for Remote Access Inside and Outside VLANs DMZ VLAN 4 Date: 1/9/01

for Networking Figure 1 ISS Cisco Core Backbone Network () The following lists the core ISS VM server farm and VM workstation OS, applications, and tools required for this course for both onsite and online course deliveries: External Hard Drive Virtual Machines Virtual Server Domain Controller DHCPWindows01 17.30.0.10/4 DFG: 17.30.0.1 Virtual Server Standalone Server TargetWindows01 DHCP DFG: 17.30.0.1 Virtual Server Standalone Server TargetUBUNTU01 DHCP DFG: 17.30.0.1 Virtual Server Standalone Server TargetUBUNTU0 DHCP DFG: 17.30.0.1 Virtual Workstationr Workstation STUDENT DHCP Virtual Workstationr Workstation INSTRUCTOR DHCP OS:Wk3 STD 3bit 1 CPU 51 MB RAM OS=0G + Active Directory DNS,IIS DHCP: SCOPE: 17.30.0.55-199 OS:Wk3 STD 3bit 1 CPU 51 MB RAM OS=0G FTP TFTP POP3 IIS Application Svcs OS: Ubuntu 10.04 LTS 1 CPU 51 MB RAM OS=10G + IPTables DVWA Apache SSH OS: Ubuntu 9.10 1 CPU 51 MB RAM OS=10G + GUFW Client Tools OS: WindowsXP Professional 1 CPU 51 MB RAM OS=10G + Wireshark Netwitness NMAP Nessus OS: WindowsXP Professional 1 CPU 51 MB RAM OS=10G + Wireshark Netwitness NMAP Nessus Figure ISS Core VM Server Farm & VM Workstations Note #1: ISS onsite students can obtain their removable hard drive directly from their ITT campus. ISS online students will be required to download the core ISS VM server farm and VM workstations directly to their personal computer for installation. The ITT Onsite or Online Instructor will provide students with the specific instructions and procedures for how to obtain the core ISS VM server farm and workstation image files during the first week of class. 5 Date: 1/9/01

for Networking (3) The following lists the new VMs, applications, and tools required to perform the equipment-based labs for this course for both onsite and online deliveries: 1. New VM for server farm: VulnerableXP01. This VM is a vulnerable Microsoft Windows Server 003 Standard Edition server used for performing attacks.. New VM for server farm: Backtrack01. A Backtrack 4 Ubuntu Server pre-loaded with the following applications and tools: a. Metasploit with required plug-ins b. Kismet c. Aircrack-ng d. Airsnort e. Snort f. MySQL g. BASE 3. New VM that Replaces the Old TargetUbuntu01 VM on the VM server farm. An Ubuntu Server 10.4 VM pre-loaded with the following applications and tools: a. Damn Vulnerable App (DVWA) b. ClamAV Installed c. Rootkit Hunter: http://www.rootkit.nl/projects/rootkit_hunter.html d. Chrootkit: http://www.chkrootkit.org/ e. Appropriate rootkit tools can be found at: http://www.packetstormsecurity.org/unix/penetration/rootkits/indexdate.html f. Infected with EICAR g. tcpdump h. Common Linux tools such as strings, sed and grep 4. Tools Directory: A directory called "tools" which contains the binary installation files for each tool covered in the course, including: a. Infected with EICAR b. ClamAV Installed c. Rootkit Hunter: http://www.rootkit.nl/projects/rootkit_hunter.html d. Chrootkit: http://www.chkrootkit.org/ e. Appropriate rootkit tools can be found at: http://www.packetstormsecurity.org/unix/penetration/rootkits/indexdate.html f. Wireshark g. Netwitness Investigator h. FileZilla FTP client/server i. Putty SSH client j. Nessus 1 1 Nessus is a Registered Trademark of Tenable Network, Inc. 6 Date: 1/9/01

for Networking k. Zenmap l. MD5sum m. SHA1sum n. GnuPG (Gnu Privacy Guard) o. OpenSSL p. VMware Player Note #: Installation instructions for installing these new VMs, applications and tools will be provided by the ISS onsite or online Instructor during day 1/ week 1 of the course. Recommended Resources Books, Professional Journals Please use the following author s names, book/article titles and/or keywords to search in the ITT Tech Virtual Library for supplementary information to augment your learning in this subject: Books Books4X7 Ebrary Periodicals ProQuest Computing Michael Cross Developer's Guide to Application Steven Splaine Testing : Assessing the of Sites and Applications Professional Associations WASC site of the Application Consortium, which is an international, non-profit group that produces open source and best-practice standards for the. http://www.webappsec.org/ ISACA 7 Date: 1/9/01

for Networking This site provides access to original research, practical education, career-enhancing certifications, industry-leading standards, and best practices. It also provides a network of likeminded colleagues and contains professional resources and technical/managerial publications. http://www.isaca.org/ The RMA Journal The official publication of the Risk Management Association http://www.rmahq.org/rma/rmauniverse/productsandservices/rmabookstore/rmajournal/ Other References OWASP The site of the Open Application Project with techniques to build, design, and test the security of applications and services. http://www.owasp.org/ NOTE: All links are subject to change without prior notice. Keywords: Internet Applications Applications Brick-and-Mortar E-Business E-Commerce Internet Risks Risks Application Risks Media Networking.0 Privacy Business Communications Internet Marketing Secure Coding WASC Audit PCI DSS Quality Assurance Testing 8 Date: 1/9/01

for Networking Assessment Application 9 Date: 1/9/01

for Networking Course Plan Instructional Methods This course is designed to promote learner-centered activities and support the development of cognitive strategies and competencies necessary for effective task performance and critical problem solving. The course utilizes individual and group learning activities, performance-driven assignments, problem-based cases, projects, and discussions. These methods focus on building engaging learning experiences conducive to development of critical knowledge and skills that can be effectively applied in professional contexts. Suggested Learning Approach In this course, you will be studying individually and within a group of your peers. As you work on the course deliverables, you are encouraged to share ideas with your peers and instructor, work collaboratively on projects and team assignments, raise critical questions, and provide constructive feedback. Use the following advice to receive maximum learning benefits from your participation in this course: DO DON T Do take a proactive learning approach Do share your thoughts on critical issues and potential problem solutions Do plan your course work in advance Do explore a variety of learning resources in addition to the textbook Do offer relevant examples from your experience Do make an effort to understand different points of view Do connect concepts explored in this course to real-life professional situations and your own experiences Don t assume there is only one correct answer to a question Don t be afraid to share your perspective on the issues analyzed in the course Don t be negative towards the points of view that are different from yours Don t underestimate the impact of collaboration on your learning Don t limit your course experience to reading the textbook Don t postpone your work on the course deliverables work on small assignment components every day 10 Date: 1/9/01

for Networking Course Outline Graded Activities Unit # Unit Title Assigned Readings Grading Category # Activity Title Grade Allocation (% of all graded work) 1 Business Evolution and the Internet Chapter 1 Chapter Quiz 1.1 Quiz 1 1 Lab 1. Evaluate Business World Transformation Impact of the Internet and WWW Quiz.1 Quiz 1 Networking and the Evolution of Personal Communication Chapter 3 Chapter 4 Lab. Project.3 Engage in Internet Research to Obtain Useful Personal Information Project Part 1: Identify E-Business and E- Commerce Apps for Planned Transformation 3 Understanding and Managing Risk in Applications Chapter 5 Chapter 6 Quiz 3.1 Quiz 3 1 Lab 3. Perform a Post-Mortem Review of a Data Breach Incident Project 3.3 Project Part : Identify Networking Apps for Planned Transformation 11 Date: 1/9/01

for Networking Graded Activities Unit # Unit Title Assigned Readings Grading Category # Activity Title Grade Allocation (% of all graded work) 4 Identifying and Classifying Weaknesses in Applications Chapter 7 Discussion 4.1 Lab 4. Project 4.3 Network Groups for All A Stupendous Idea or Incident Waiting to Happen? Exploit Known Vulnerabilities on a Live Server Project Part 3: Identify Risks, Threats, and Vulnerabilities 6 Quiz 5.1 Quiz 4 1 5 Strategies for Developing Secure Applications Chapter 8 Chapter 9 Lab 5. Project 5.3 Apply OWASP to a Assessment Project Part 4: Application Vulnerabilities and Motivations for Attack 6 Auditing Applications Chapter 10 Quiz 6.1 Quiz 5 1 Lab 6. Align Compliance Requirements to FISMA, SOX, HIPAA, GLBA, PCI DSS and AICPA Project 6.3 Project Part 5: Analyze the Software Development Life Cycle (SDLC) 1 Date: 1/9/01

for Networking Graded Activities Unit # Unit Title Assigned Readings Grading Category # Activity Title Grade Allocation (% of all graded work) Discussion 7.1 site analysis Know your visitors 6 7 The Role of Quality Assurance Testing for Applications Chapter 11 Lab 7. Perform Dynamic and Static Quality Control Testing Project 7.3 Project Part 6: Plan for Compliance Quiz 8.1 Quiz 6 1 8 Vulnerability and Assessments of Applications Chapter 1 Lab 8. Project 8.3 Perform an IT & Application Assessment Project Part 7: Configuration Management, Change Management, and Test Plans 9 Emerging Trends in Application Chapter 13 Discussion 9.1 Lab 9. Business Anywhere and the Mobile User Recognize Risks & Threats Associated with Networking & Mobile Communications 6 Project 9.3 Project Part 8: Vulnerability and Assessment 13 Date: 1/9/01

for Networking Graded Activities Unit # Unit Title Assigned Readings Grading Category # Activity Title Grade Allocation (% of all graded work) 10 Modeling Application Strategies Chapter 14 Quiz 10.1 Quiz 7 1 Lab 10. Project 10.3 Build a Application & Lifecycle Plan Project Part 9: End- Point Device 11 Course Review and Final Examination N/A Project 11.1 Project Part 10: Life Cycle Exam 11. Final Exam 5 1 Candidate for eportfolio 14 Date: 1/9/01

for Networking Evaluation and Grading Evaluation Criteria The graded assignments will be evaluated using the following weighted categories: Category Weight Lab 0 Project 30 Quiz 7 Discussion 18 Exam 5 TOTAL 100% Grade Conversion The final grades will be calculated from the percentages earned in the course, as follows: Grade Percentage Credit A 90 100% 4.0 B+ 85 89% 3.5 B 80 84% 3.0 C+ 75 79%.5 C 70 74%.0 D+ 65 69% 1.5 D 60 64% 1.0 F <60% 0.0 15 Date: 1/9/01

for Networking Academic Integrity All students must comply with the policies that regulate all forms of academic dishonesty, or academic misconduct, including plagiarism, self-plagiarism, fabrication, deception, cheating, and sabotage. For more information on the academic honesty policies, refer to the Student Handbook. (End of ) 16 Date: 1/9/01