Required Textbook and Materials. Course Objectives. Course Outline

Similar documents
Required Textbook and Materials. Course Objectives

Installing and Configuring Windows Server 2012 (ITNW 1370)

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise (ITCC 1312)

Configuring Advanced Windows Server 2012 Services (ITNW 1372)

Network Troubleshooting and Support (ITNW 2335)

Configuring Advanced Windows Server 2012 Services (ITNW 1372)

Windows Server 2008 Applications Infrastructure Configuration (ITMT 2322)

Administering Windows server 2012 (ITNW 1371)

Introduction to Computing (COSC 1301) Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: None

Business Computer Applications (BCIS 1305)

Prerequisit. cies. overview of. David. interviews. In research, the

ITSY 1342 Information Technology Security Spring 2017

Network Security

Introduction to Computing (COSC 1301) Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: None

ITSY Information Technology Security Course Syllabus Spring 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Business Computer Applications (BCIS 1305) Online. Credit: 3 semester credit hours (3 hours lecture)

Introduction to Computing (COSC 1301) Online

Prerequisit. cies. Consortium. on Creating. interviews. In research, the. Standards. A. Software Program(s) 3. Web

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CompTIA Security+ Study Guide (SY0-501)

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Security+ SY0-501 Study Guide Table of Contents

Schedule of Maine is IT Offerings: 01/20/ /16/2015 Three Core IT Offerings:

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

IT150 - IT Systems Security +

South Portland, Maine Computer Information Security

CompTIA Security+ (Exam SY0-401)

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

ITSY Y1 Information Technology Security Course Syllabus _ Page 1 COURSE SYLLABUS. Course Name INFORMATION TECHNOLOGY SECURITY

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CRN150 Fundamentals of Network Security

PASSAIC COUNTY TECHNICAL INSTITUTE 45 Reinhardt Rd. Wayne, NJ. Information Technology & Network Security III (ITNS III) Course # 1025 Developed 2018

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

CompTIA Cybersecurity Analyst+

Software Development & Education Center Security+ Certification

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

ISM 324: Information Systems Security Spring 2014

IT Foundations Networking Specialist Certification with Exam

Syllabus. Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document.

CompTIA A+ Certification ( ) Study Guide Table of Contents

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

ITSY 2330 Intrusion Detection Course Syllabus

Networking Fundamentals Training

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

QuickBooks Online Security White Paper July 2017

HOUSTON COMMUNITY COLLEGE SOUTHWEST. Local Area Networks Design and Protocol Cisco 2 - ITCC 1006

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT

Instructor: Eric Rettke Phone: (every few days)

SYLLABUS. Networking IV CIST0250. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. CIST-0216 Networking III

Network Engineering/Cyber Security I & II

CTS1134C Network Essentials (3 Credits), Fall 2018

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

NE-2277 Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services

Computer Network Engineering

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Computer Network Engineering

CompTIA Network+ (Exam N10-006)

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS

Deploying Cisco ASA VPN Solutions v2.0 (VPN)

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Computer Networking. AAS Computer Networking Integrated Networking Technologies Track 60 Credit Hours

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Syllabus -- CIS Computer Maintenance / A+ Certification

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) 04 Apr 2018

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) ( Add-On ) 15 Jul 2018

Course Syllabus: CompTIA A+

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358

Computer Science Technology Department

Course Syllabus: CompTIA Network+

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

CompTIA Network+ Study Guide Table of Contents

Implementing Cisco Network Security (IINS) 3.0

Computer Science & IT

Certified Ethical Hacker

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

Computer Information Systems

Course Outline. CISSP - Certified Information Systems Security Professional

Course 831 Certified Ethical Hacker v9

Standard Course Outline IS 656 Information Systems Security and Assurance

EC-Council C EH. Certified Ethical Hacker. Program Brochure

DIABLO VALLEY COLLEGE CATALOG

COWLEY COLLEGE & Area Vocational Technical School

ITSC 1305 Introduction to PC Operating Systems Summer 2015

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified

Computer Science Technology Department

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

ITNW 1325 Fundamentals of Networking Spring 2016

ITNT-2370: NETWORK SECURITY FUNDAMENTALS

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Mobility Windows 10 Bootcamp

Transcription:

Information Technology Security (ITSY 1342) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Instruction in security for network hardware, software, and data, including physical security: backup procedures: relevant tools: encryption: and protection from viruses. Required Textbook and Materials 1. TestOut Security Pro by www.testout.com, 2016. 2. Computer Networking and Troubleshooting Technology students are required to have one portable external Hard Drive with a capacity of 500GB or larger to be used for the duration of the time to complete their respective degree. Course Objectives Upon completion of this course, the student will be able to: 1. Employ the physical security of network infrastructure components using National Institute of Standards and Technology (NIST) Guidelines and other best practices. 2. Develop backup procedures to provide for data security. 3. Use network operating system features to implement network security. 4. Identify computer and network threats and vulnerabilities and methods to prevent their effects. 5. Use tools to enhance network security. 6. Use encryption techniques to protect network data. Course Outline 1. Introduction a. Security Overview b. Using the Simulator 2. Access Control and Identity Management a. Access Control Models b. Authentication c. Authorization d. Access Control Best Practices e. Active Directory Overview f. Windows Domain Users and Groups g. Linux Users h. Linux Groups i. Linux User Security j. Group Policy Overview

k. Hardening Authentication 1 l. Hardening Authentication 2 m. Remote Access n. Network Authentication o. Identity Management 3. Cryptography a. Cryptography b. Hashing c. Symmetric Encryption d. Asymmetric Encryption e. Public Key Infrastructure (PKI) f. Cryptography Implementations 4. Policies, Procedures, and Awareness a. Security Policies b. Manageable Network Plan c. Business Continuity d. Risk Management e. Incident Response f. Social Engineering g. Certification and Accreditation h. Development i. Employee Management j. Third-Party Integration 5. Physical Security a. Physical Security b. Hardware Security c. Environmental Controls d. Mobile Devices e. Mobile Device Security Enforcement f. Telephony 6. Perimeter Defenses a. Network Layer Protocol Review b. Transport Layer Protocol Review c. Perimeter Attacks 1 d. Perimeter Attacks 2 e. Security Appliances f. Demilitarized Zones (DMZ) g. Firewalls h. Network Address Translation (NAT) i. Virtual Private Networks (VPN)

j. Web Threat Protection k. Network Access Control (NAC) l. Wireless Overview m. Wireless Attacks n. Wireless Defenses 7. Network Defenses a. Network Devices b. Network Device Vulnerabilities c. Switch Attacks d. Router Security e. Switch Security f. Intrusion Detection and Prevention g. SAN Security 8. Host Defenses a. Malware b. Password Attacks c. Windows System Hardening d. Hardening Enforcement e. File Server Security f. Linux Host Security g. Static Environment Security 9. Application Defenses a. Web Application Attacks b. Internet Browsers c. E-Mail d. Network Applications e. Virtualization f. Application Development 10. Data Defenses a. Redundancy b. Backup and Restore c. File Encryption d. Secure Protocols e. Cloud Computing 11. Assessments and Audits a. Vulnerability Assessment b. Penetration Testing c. Protocol Analyzers d. Log Management e. Audits

Grade Scale 90 100 A 80 89 B 70 79 C 60 69 D 0 59 F Course Evaluation Final grades will be calculated according to the following criteria: Labs 25% Practice Questions 10% Module Tests 35% Final Exam 30% Course Requirements 1. Demonstrate proficiency through hands-on labs as assigned. 2. Completion of Study Guides as assigned. Course Policies 1. No food, drinks, or use of tobacco products in class. 2. Electronic devices not being used for the class, such as phones and headphones, must be turned off while in class. 3. Do not bring children to class. 4. Certification: If a student passes the certification test that is associated with this class, you will receive an A on the final exam and credit for 25% of your labs. If you have missed a previous test, you must still take the final exam to substitute for that grade. 5. Attendance Policy: Three absences are allowed. If a student is tardy to class or departs early three (3) times, it will be equal to one (1) absence. Each absence beyond three absences will result in a 2 point deduction from your final grade. 6. If you wish to drop a course, the student is responsible for initiating and completing the drop process. If you stop coming to class and fail to drop the course, you will earn an F in the course. 7. Tools: Return all tools and/or software to their designated place. 8. A grade of C or better must be earned in this course for credit toward degree requirement. 9. Additional course policies, as defined by the individual course instructor, will be outlined in the course addendum and provided by the instructor. Disabilities Statement The Americans with Disabilities Act of 1992 and Section 504 of the Rehabilitation Act of 1973 are federal anti-discrimination statutes that provide comprehensive civil rights for persons with

disabilities. Among other things, these statutes require that all students with documented disabilities be guaranteed a learning environment that provides for reasonable accommodations for their disabilities. If you believe you have a disability requiring an accommodation, please contact the Special Populations Coordinator at (409) 880-1737 or visit the office in Student Services, Cecil Beeson Building. Technical Requirements (for courses using Blackboard) The latest technical requirements, including hardware, compatible browsers, operating systems, software, Java, etc. can be found online at: https://help.blackboard.com/enus/learn/9.1_2014_04/student/015_browser_support/015_browser_support_policy A functional broadband internet connection, such as DSL, cable, or WiFi is necessary to maximize the use of the online technology and resources. Student Code of Conduct Statement It is the responsibility of all registered Lamar Institute of Technology students to access, read, understand and abide by all published policies, regulations, and procedures listed in the LIT Catalog and Student Handbook. The LIT Catalog and Student Handbook may be accessed at www.lit.edu or obtained in print upon request at the Student Services Office. Please note that the online version of the LIT Catalog and Student Handbook supersedes all other versions of the same document. Certification Requirement CNTT majors are required to earn certification in one of the following areas prior to graduation. A+ Certification Cisco Certified Entry Network Technician (CCENT) Cisco Certified Network Associate (CCNA) Microsoft Certified Solutions Associate (MCSA) This course covers the material to prepare for CompTIA s Security+ certification, exam number SY0-401. Students are responsible for scheduling and paying for the certification through the LIT Testing Center. More information about the certification can be found online at https://certification.comptia.org/certifications/a. Course Schedule Week of Topic Reference Week 1 Hybrid www.testout.com Week 2 Syllabus and policies Course Introduction Module 1:Introduction

Week of Topic Reference Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Week 16 Contact Information: Program Director: Office: Module 2: Access Control and Identity Management Module 2: Access Control and Identity Management Module 2: Access Control and Identity Management Module 3:Cryptography Module 4: Policies, Procedures, and Awareness Module 4: Policies, Procedures, and Awareness Module 5: Physical Security Module 6: Perimeter Defenses Module 6: Perimeter Defenses Module 7: Network Defenses Module 8: Host Defenses Module 9: Application Defenses Module 10: Data Defenses Module 11: Assessments and Audits Lauri Arnold-Calder Program Director Computer Networking and Troubleshooting Technology Office 103C, TA-4 Telephone: (409) 839-2050 E-mail: ldarnold@lit.edu