SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

Similar documents
Fundamentals of Network Security v1.1 Scope and Sequence

Informal Write-up on CCNA Security. October, 2009 (V1.0)

Implementing Cisco Network Security (IINS) 3.0

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL II. VERSION 2.0

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CND Exam Blueprint v2.0

Syllabus: The syllabus is broadly structured as follows:

CCNA Security 1.0 Student Packet Tracer Manual

CCNP R&S. Plan, implement, secure, maintain, and troubleshoot converged enterprise networks. Prepare for Cisco CCNP Routing & Switching certification

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

McAfee Network Security Platform Administration Course

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Network Engineering/Cyber Security I & II

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Cisco Associate-Level Certifications

Interconnecting Cisco Networking Devices: Accelerated

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

Security+ SY0-501 Study Guide Table of Contents

Cisco Certified Network Professional (CCNP)

CCNA R&S: Introduction to Networks. Chapter 11: It s a Network

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Certified Cisco Networking Associate v1.1 ( )

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Understanding Cisco Cybersecurity Fundamentals

VPN Troubleshooting. VPN Troubleshooting CHAPTER20. Tunnel Details

Implementing Cisco IP Switched Networks (SWITCH)

Course 831 Certified Ethical Hacker v9

Computer Network Engineering

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Cisco Certified Network Associate ( )

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

CCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

CCNA. Security STUDY GUIDE. Tim Boyles. Covers All Exam Objectives for IINS

Cisco Security Solutions for Systems Engineers (SSSE) Practice Test. Version

CCNA Routing and Switching (NI )

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Chapter 3 Network Foundation Protection (NFP) Overview 39. Configuring and Implementing Switched Data Plane Security Solutions 57

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

NETWORK THREATS DEMAN

Scope and Sequence: CCNA Exploration v4.0

CCNA DISCOVERY V4.0 WORKING AT A SMALL-TO-MEDIUM BUSINESS OR ISP INSTRUCTOR REFERENCE GUIDE. Prepared by Cisco Learning Institute

S.No. CCIE Security Written Exam Topics v4.0 Part I Infrastructure, Connectivity, Communications, Network Security

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Course: CCNA Bootcamp (Intensive CCNA)

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

Scope and Sequence: CCNA Discovery v4.0

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

Exam Topics Cross Reference

CCNA Routing & Switching

Interconnecting Cisco Networking Devices Part 1 ICND1

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012

Computer Network Engineering

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

2. Firewall Management Tools used to monitor and control the Firewall Environment.

Cisco 4: Enterprise Networking

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

CCNA ROUTING & SWITCHING

Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND 2)

CISCO CCNP Cisco Certified Network Professional v2.0

Certified Ethical Hacker

Cisco CCNA (ICND1, ICND2) Bootcamp

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

IT Foundations Networking Specialist Certification with Exam

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

COMPUTER REPAIR IV. Cisco Networking Academy 2. Angelo Valdez

Networks and Communications MS216 - Course Outline -

Software Development & Education Center Security+ Certification

CEH: CERTIFIED ETHICAL HACKER v9

CCNA Cybersecurity Operations. Program Overview

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CCIE Security. Course Outline. CCIE Security. 07 Oct

This course supports the assessments for BSV1. The course covers 6 competencies and represents 3 competency units.

CCNA Security. 2.0 Secure Access. 1.0 Security Concepts

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Course Syllabus: CompTIA Network+

MLR Institute of Technology

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Internet Key Exchange

Strategic Infrastructure Security

2. INTRUDER DETECTION SYSTEMS

Cisco 5921 Embedded Services Router

Cisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0. Upcoming Dates. Course Description. Course Outline

Implementing Cisco Cybersecurity Operations

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Unified Communications Networks Security and Platforms

Cisco Exam Questions & Answers

Transcription:

SYLLABUS DIVISION: Business and Engineering Technology REVISED: FALL 2015 CURRICULA IN WHICH COURSE IS TAUGHT: IST, Information Systems Technology COURSE NUMBER AND TITLE: ITN 262 Cisco CCNA Security CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4 I. CATALOG DESCRIPTION: ITN 262 - Covers an in-depth exploration of various communications protocols with a concentration on TCP/IP. Explores communication protocols from the point of view of the hacker in order to highlight protocol weaknesses. Includes Internet architecture, routing, addressing, topology, fragmentation and protocol analysis, and the use of various utilities to explore TCP/IP. II. RELATIONSHIP OF THE COURSE TO CURRICULA OBJECTIVES: Demonstrate proficiency in the fundamental Information Technology skills required to provide user support in business. Implement and maintain computer based information systems to support the decision-making function of management. Apply analytical and problem solving skills for typical computer system designs, planning, implementation and support. Design, code, test, debug, and document code for programs and other software needed for computer system implementation and maintenance. Apply current industry standards, protocols, and techniques; and keep up with evolving technology to maintain professional proficiency. User vendor supplied instructions material and testing tools leading towards certification. Please Note: The overall Learner Outcomes from all of the course requirements for the A.A.S. Degrees in IT are more in-depth than those of the Career Studies Certificates. However, the IT courses that are the same in both the A.A.S. Degrees and the Certificate Programs carry the same Learner Outcomes and are identical in content. Please review the DCC Catalog or visit the DCC Web Site for more details. III. REQUIRED BACKGROUND: None IV. COURSE CONTENT: Modern Security Threats Securing Network Devices Authentication, Authorization and Accounting (AAA) Implementing Firewall Technologies

Implementing Intrusion Prevention Securing the Local Area Network (LAN) Cryptographic Systems Implementing Virtual Private Circuits Managing a Secure Network V. THE FOLLOWING GENERAL EDUCATION OBJECTIVES WILL BE ADDRESSED IN THIS COURSE. STUDENTS WILL: X Communications Learning Skills X Critical Thinking Interpersonal Skills and Human Relations X Computational and Computer Skills Understanding Culture and Society X Understanding Science and Technology Wellness VI. LEARNER OUTCOMES VII. EVALUATION Modern Security Threats Describe the Evolution of Network Security Identify the Drivers for Network Security Understand the issues with Network Security Organizations Identify Domains of Network Security Configure Network Security Policies CUnderstand the difference in Viruses, Worms, and Trojan Horses Mitigate Viruses, Worms, and Trojan Horses Understand Attack Methodologies such as Reconnaissance Attacks, Access Attacks, Denial of Service Attacks, and Network Attacks Securing Network Devices Secure the Edge Router

Configure Secure Administrative Access Configure Enhanced Security for Virtual Logins Configure SSH Assign Administrative Roles Configure Privilege Levels Configure Role-Based CLI Access Monitor and Manage Networking Devices including Securing the Cisco IOS Image and Configuration Files as well as Secure Management and Reporting Utilize Syslog for Network Security Utilize SNMP and NTP Technologies CPerform Automated Security Features including Locking Down a Router using AutoSecure and SDM Authentication, Authorization and Accounting (AAA) Identify the purpose and characteristics of AAA Configure Local AAA Authentication with CLI and SDM Troubleshooting Local AAA Authentication Identify Server-Based AAA including characteristics and Protocols Configure Server-Based AAA Authentication using the CLI and SDM Methods Troubleshoot Server-Based AAA Authentication Implementing Firewall Technologies Configure and use Standard and Extended Access Lists

Understand the Topology and Flow for Access Control Lists Configure Standard and Extended Access Lists using SDM Configure TCP Established and Reflexive Access Control Lists Configure Dynamic and Time-Based Access Control Lists CTroubleshoot Complex Access Control Lists Mitigate Attacks with Access Control Lists Define he types of Firewalls and Secure Network Resources Define the Characteristics, Operation, and Configuration of CBAC Troubleshoot CBAC Define and Configure Zone-Based Firewalls Configure Secure Administrative Access Implementing Intrusion Prevention Define IDS and IPS Characteristics Define Host-Based IPS Implementations Define Network-Based IPS Define IPS Signature Characteristics Configure and Tune IPS Alarms Be Manage and Monitor IPS Traffic Configure and Modify Cisco IOS IPS with CLI and SDM Verify and Monitor IPS Traffic Securing the Local Area Network Define Endpoint Security including

IronPort, Network Admission Control and Security Agent Define Layer 2 Security Considerations including Spoofing, OverFlow, Manipulation, Storm, and VLAN Attacks Configure and Verify Port Security Configure BPDU Guard, Root Guard, Storm Control, VLAN Trunk Security Configure Cisco Switched Analyzer including Remote Access Configure Wireless, VoIP, and SAN Security Cryptographic Systems Define Cryptography, Cryptanalysis, and Cryptology Create Integrity with MD5 and SHA-1 including Authenticity with HMAC and Key Management Systems Configure Encryption using Standard, Advanced, Alternate, and Diffie-Hellman Key Exchange Options Define and Configure Digital Signatures including Certificate Authorities Implementing Virtual Private Networks Define VPN Topologies and Solutions Configure Site-to-Site GRE Tunnels Define and Configure IPSec as it relates to Securing VPN Traffic Verify and Troubleshoot IPSec Configurations Implement a Site-to-Site IPSec VPN with SDM using the Defined Wizard Implement Remote Access VPNs

Configure a VPN using Cisco Easy VPN and SDM including the VPN Client Managing a Secure Network Ensure a Network is Secure including Threat Identification, Risk Analysis, Risk Management, and Risk Avoidance Define Cisco Self-Defending Network including Solutions for SDN Define the Principles of Operations Security Implement Network Security Testing Implement a Disaster Recovery Plan including Continuity Planning, Disruptions and Backups Develop a Security Policy including Standards, Guidelines, and Procedures Develop Security Awareness and Training including details on the Laws and Ethics and Responding to a Security Breach