Nov 24, 2024  
2018 - 2019 Catalog 
    
2018 - 2019 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CST 152 - Implementing Network Security

Credits: 3
Provides knowledge and the practical experience necessary to evaluate, implement, and manage secure information transferred over computer networks. Includes network security, intrusion detection, types of attacks, methods of attacks, security devices, basics of cryptography, and organizational security elements.

Prerequisite(s): CST 150W  
Corequisite(s): None
Lecture Hours: 15 Lab Hours: 30
Meets MTA Requirement: None
Pass/NoCredit: Yes

Outcomes and Objectives
  1. Discuss network defense fundamentals.
    1. Discuss TCP/IP networking.
    2. Discuss the threats to network security.
    3. Discuss goals of network security.
    4. Discuss using network defense technologies in layers.
    5. Discuss the impact of defense.
  2. Discuss security policy design: risk analysis.
    1. Discuss the fundamental concepts of risk analysis.
    2. Discuss the approaches to risk analysis.
    3. Discuss risk analysis as an ongoing process.
    4. Discuss deciding how to minimize risk.
  3. Discuss network traffic signatures.
    1. Discuss understanding signature analysis.
    2. Discuss detecting traffic signatures.
    3. Discuss identifying suspicious events.
    4. Discuss using the Common Vulnerabilities and Exposures (CVE) Standard.
  4. Discuss Virtual Private Network (VPN) Concepts.
    1. Discuss what VPNs are and why establish them.
    2. Discuss VPN core activity 1: Encapsulation.
    3. Discuss VPN core activity 2: Encryption.
    4. Discuss VPN core activity 3: Authentication.
    5. Discuss the advantages and disadvantages of VPNs.
  5. Discuss VPN implementation.
    1. Discuss designing a VPN.
    2. Discuss configuring VPNs.
    3. Discuss using VPNs with firewalls.
    4. Discuss adjusting packet-filtering rules for VPNs.
    5. Discuss auditing VPNs and VPN policies.
  6. Discuss intrusion detection system concepts.
    1. Describe intrusion detection system components.
    2. Discuss intrusion detection through the 7 steps.
    3. Discuss options for implementing intrusion detection systems.
    4. Discuss the evaluation of intrusion detection systems.
  7. Discuss intrusion detection and incident response.
    1. Discuss developing IDS filter rules.
    2. Discuss developing a Security Incident Response Team (SIRT).
    3. Discuss how to respond: the incident response process.
    4. Discuss dealing with false alarms.
    5. Discuss dealing with legitimate security alerts.
  8. Discuss choosing and designing firewalls.
    1. Discuss firewalls in general.
    2. Discuss approaches to packet filtering.
    3. Discuss creating rules and establishing restrictions.
    4. Discuss designing firewall configurations.
    5. Compare software and hardware firewalls.
  9. Discuss firewall topology.
    1. Discuss securing network perimeters.
    2. Discuss choosing a bastion host.
    3. Discuss working with proxy servers.
    4. Discuss using NAT.
    5. Discuss authenticating users.
  10. Discuss strengthening and managing firewalls.
    1. Discuss managing firewalls to improve security.
    2. Discuss Check Point NGX.
    3. Discuss Microsoft ISA Server.
    4. Discuss managing and configuring IP tables.
  11. Discuss strengthening defense through ongoing management.
    1. Discuss security event management.
    2. Discuss security auditing.
    3. Discuss managing an IDS.
    4. Discuss improving defense in-depth.
    5. Discuss keeping pace with network needs.
    6. Discuss maintaining your own knowledge base.



Add to Portfolio (opens a new window)