Instructor: Edwin Reed-Sanchez
Email: [email protected]
Class meets: M / F - 1:00PM - 3:45PM
Office Hours: M / F - 4:00PM - 5:00PM
Network Security First-Step,
Author: Tom Thomas
Publisher: Cisco Press
ISBN-13: 978-1587204104
This course is provides a fundamental overview of Network Security. It covers authentication methods, common network attacks and how to safeguard against them. It also covers important security aspects related to the use of remote access, the Web, directory and file transfer, and wireless data. Moreover firewalls, routers, switches, and other network hardware in security are examined. Network Security Topologies and Network Operating System vulnerabilities are also examined.
After completing this course, students will be able to: • Describe the Network Security Models and Internetworking, Internet Services and Security Essentials • Identify Network Security Devices and their role for securing remote access to the network • Incorporate Firewalls and Intrusion Detection Systems (IDS) • Identify Network Authentication Systems • Identify the security issues related to wireless data transfer
Class attendance and participation are significant components of the learning process and play a major role in determining overall student academic achievement. Therefore, students are strongly encouraged to attend and participate in all class sessions of the course in which they are registered. The maximum number of excused absence hours is limited to one more class hour than the contact hours. For example, a student enrolled in a class that meets five hours per week is allowed six hours of absence (not six days). Final grades will be lowered ½ grade for each class hour absence thereafter. Late arrivals (10-30 minutes) to class will be considered ½ class hours absence. Arrivals after 30 minutes may, at the discretion of instructor, be marked absent for the entire class hours.
Lab/homework 40%
Midterm 20%
Project 15%
Final Exam 25%
Total 100%
HOMEWORK
-
Draw your network at home (Due Sunday Feb 2) You can use vizio,creatly, lucidchart, or just sketch it out on paper Here is a link to understand network diagrams: creately.com/blog/diagrams/network-diagram-guide-tutorial
-
Read Chapter 1 Network Security First-Step Author: Tom Thomas ISBN-13: 978-1587204104
-
Complete Labs: Securing the pfSense Firewall Implementing NAT and Allowing Remote Access (due Friday Feb. 7 ) If you have any questions do not hesitate to contact me.
HW: Complete Labs
- Securing the pfSense Firewall
- Implementing NAT and Allowing Remote Access
- Implementing Common Protocols and Services
- Examining Wireless NetworkS Also add me as your professor with email [email protected] in infoseclearning.com.
- In your groups do a 3 slide malware report. Due feb 13. 1st slide: name of virus, what did the virus do, and how many people where affected. 2nd slide: How does the malware work? What is it’s mode of transmission. And how did it effect the computer system. 3rd slide: who discovered the malware. What was the security patch or fix.
Please use some images or diagrams to try to explain the virus. The purpose of this homework is to get an in-depth knowledge of a particular malware and be able to present it and discuss it in detail. Send slides with the names of people in your group by Fed. 13 midnight.
Slides HW: Read Chapter 3 of network Security First-Step Prepare for Quiz on 2/24/2020
Here are the quiz concepts Quiz will include concepts in Slides from week 1, week 2, and week 3; and Chapter 1 and Chapter 2 of Network Securoty First-Step. The quiz WILL NOT cover Chapter 3.
Slides: Quiz Prep
This week we are working on understanding security risk assesments based on different types of companies.
Group (home)work will be to find a company and do a thourough risk assesment of the compainy and it major security threats. Security Threat Worksheet Final Presentations for Risk Assement will be due on Friday March 13.
Review of Labs: Slides
- Implementing Security Policies on Windows and Linux
- Data Backups in Windows, BSD, and Linux
Review basic commands for Linux Command line and Microsoft Command Prompt.
- Tutorial for Linux Terminal
- Tutorial for CMD
Slides Lecture: Risk Management, Risk Avoidance, Risk Transference, Risk Mitigation, Risk Acceptance, Risk Deterrents, Risk Register. In-class: In groups complete Company Risk Assesment Worksheet Company Security Risk Assessment Worksheets
Homework: Complete Risk Assesment Report
The midterm will be on released on March 20 and will need to be completed by March 22. Your midterm grade will include: Home Network Diagram, Labs 1-6, Malware Presentation, Company Risk Assesment Report, Security Test 1, Security Midterm, and attendance. Here is what will be on the midterm: Midterm Slides
- Security Technologies
- Security protocols
- Firewalls and their Implementation
- Review & Mid Term Exam
- Virtual Private Networks (VPN)
- Intrusion Detection Systems (IDS)
- Final Exam