Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Network security firewalls and vpns second edition pdf

23/11/2021 Client: muhammad11 Deadline: 2 Day

Syllabus: Access Control, Authentication, and Public Key Infrastructure

Course Summary
Course Number and Name
ISOL 532 – Telecommunications and Network Security

Course Term and Delivery
2018 – Fall IIG

Asynchronous Online Course

Course Instructor
Dr. Jamia S. Mills, Adjunct Professor

Email: Jamia.mills@ucumberlands.edu

Office Hours: By Appointment

Catalog Course Description
Various network security-related issues are introduced and examined. Different types of VPNs for securing data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to implement a VPN. Other topics include the utility of firewalls in tackling security problems and the limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a firewall and the functionality of a firewall.

Course Objectives
Course Competencies/ Learning Objectives

Course Learning Objectives

Major Instructional Areas

Assessment Method

Explain the fundamental concepts of network security.

Network security risks, threats, and vulnerabilities

Exams, DB Posts, Project

Describe the fundamental functions performed by firewalls.

Firewall types, functions, uses, and deployment strategies

Exams, DB Posts, Project

Describe the foundational concepts of VPNs.

VPN types, functions, uses, and deployment strategies

Exams, DB Posts, Project

Recognize the impact that malicious exploits and attacks have on network security.

Exams, DB Posts, Project

Describe network security implementation strategies and the roles each can play within the security life cycle.

Network-centric TCP/IP protocols and applications

Exams, DB Posts, Project

Identify network security management best practices and strategies for responding when security measures fail.

Layered network security strategies; secure network design; best practices and strategies for network security and incident response

Exams, DB Posts, Project

Manage and monitor firewalls and understand their limitations.

Exams, DB Posts, Project

Assess firewall design strategies and apply firewall management best practices.

Exams, DB Posts, Project

Appraise firewall and other security options available for personal and small office/home office (SOHO) environments.

Exams, DB Posts, Project

Appraise elements of VPN implementation and management.

Exams, DB Posts, Project

Describe common VPN technologies.

Exams, DB Posts, Project

Follow the creation of an example firewall implementation and an example VPN implementation.

Exams, DB Posts, Project

Evaluate available resources and trends in network security.

Exams, DB Posts, Project

Course Structure
· Watch weekly lecture

· Participate in class discussion via iLearn forums

· Reading assigned texts

· Complete quizzes based on assigned reading and lecture

· Complete cases based upon a given scenario

· Complete homework assignments from the text and other sources

Learning Materials and References
Required Resources
Textbook(s) Required:

· Stewart, James M. Network Security, Firewalls, and VPNs, 2nd ed. Burlington, MA: Jones & Bartlett, 2014

· Virtual Security Cloud Labs*

· Student Lab Manual (available within the virtual lab environment) *

* These resources are available if your educational institution purchased the Jones & Bartlett Learning lab manuals along with the courseware.

Recommended Materials/Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.

Books, Professional Journals

· Seymour Bosworth, et al.

Computer Security Handbook, 5th ed. (Chapters 3, 21, and 26)

· Douglas E Comer

Internetworking with TCP/IP, 5th ed.

· Anne Henmi (ed). Firewall Policies and VPN Configurations (Chapters 2 and 5)

· Jonathan Katz

Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC

· Mark Lewis

Comparing, Designing, and Deploying VPNs

· John Mairs

VPNs: A Beginner's Guide

· Noonan et al.

Firewall Fundamentals

· Michael Rash Linux Firewalls: Attack Detection and Response With Iptables, Psad, and Fwsnort

· Rhodes-Ousley et al.

Network Security: The Complete Reference

· Debra L. Shinder, et al. Scene of the Cybercrime, 2nd ed.

· Thomas Shinder The Best Damn Firewall Book Period, 2nd ed.

· W. Richard Stevens et al.

TCP/IP Illustrated

· James M. Stewart, et al. CISSP: Certified Information Systems Security Professional Study Guide, 5th ed.

· Keith Strassberg et al.

Firewalls: The Complete Reference

· John R. Vacca, et al Firewalls: Jumpstart for Network and Systems Administrators

· Michael E. Whitman et al.

Guide to Firewalls and Network Security

· Ruixi Yuan

Virtual Private Networks: Technologies and Solutions

· Elizabeth D. Zwicky et al.

Building Internet Firewalls, 2nd ed.

Other References
· Common Vulnerabilities and Exposures (CVE)

http://cve.mitre.org

· Information Assurance Support Environment (IASE): Security Technical Implementation Guides (STIGS)

http://iase.disa.mil/stigs/index.html

· Chris May, et al.

Advanced Information Assurance Handbook

http://www.dtic.mil/dtic/tr/fulltext/u2/a443478.pdf

Professional Associations

· CERT

This Web site provides assistance in understanding and handling security vulnerabilities. It also provides research tools on long-term changes in networked systems and gives training assistance to improve security.

http://www.cert.org/

· International Association of Privacy Professionals (IAPP)

This Web site provides opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice.

https://www.privacyassociation.org/

· International Information Systems Security Certification Consortium, Inc., (ISC)²®

This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools.

http://www.isc2.org/

· ISACA

This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of like-minded colleagues and contains professional resources and technical/managerial publications.

https://www.isaca.org/Pages/default.aspx

· National Institute of Standards and Technology (NIST)

This Web site provides access to subject matter experts and also facilitates in research. It also provides career-building resources and opportunities.

http://www.nist.gov/index.html

· National Security Agency/Central Security Service (NSA/CSS)

This Web site provides guidance on information assurance security solutions and also provides insights on risks, vulnerabilities, mitigations, and threats. It also provides information on cryptologic support. http://www.nsa.gov/index.shtml

· SANS: Computer Security Training, Network Research & Resources

This Web site provides information on computer security training through several delivery methods like live and virtual conferences, mentors, online, and onsite. It also provides certification and numerous free security resources. http://www.sans.org

Evaluation and Grading
Course Assignments and Evaluation Criteria
Grading will be based on accumulated points of each graded requirement in the course distributed as described in the table below:

Required Assignments*

Assignment

Description

Weight

Exams (2)

Each exam will consist of multiple choice, short answer questions, discussion questions, and other security related questions. Exam items will be derived primarily from lectures and readings. Exams will be available through iLearn, but must be completed independently. See course calendar for tentative due dates.

55%

Labs

Labs will be assigned weekly to complement the required readings.

20%

Project

Students will complete a network security plan project.

25%

TOTAL

100%

* Assignments may change at the discretion of the professor and changes in the assignments will be announced in class. Students are responsible for noting and completing any changes in assignments.

Grade Conversion
The final grades will be calculated from the percentages earned in the course, as follows:

Grade

Percentage

A

90–100%

B

80–89.5%

C

70–79.5%

F

<69.5%

Course Expectations
Class Participation
Students are expected to:

1. Be fully prepared for each class session by studying the assigned reading material and preparation of the material assigned.

2. Participate in group discussions, assignments, and panel discussions.

3. Complete specific assignments when due and in a professional manner.

4. Take exams when specified on the attached course schedule

Academic Integrity
At a Christian liberal arts University committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

a. cheating - using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities

b. lying—falsifying, fabricating, or forging information in either written, spoken, or video presentations

c. plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Students with Disabilities
University of the Cumberlands accepts students with certified disabilities and provides reasonable accommodations for their certified needs in the online classroom or in other areas. For accommodations to be awarded, a student must submit a completed Accommodations Application form and provide documentation of the disability. Students who may have a disability meriting an academic accommodation should contact the Disability Services Coordinator (Nate Clouse, in Boswell Campus Center) to ensure that their needs are properly evaluated and that documentation is on file. Any accommodations for disabilities must be re-certified each bi-term by the Disability Services Coordinator before course adjustments are made by individual instructors.

Student Responsibilities
1. Students are expected to login several times per week to participate in class discussions.

2. Students are expected to find out if any changes have been made in the class or assignment schedule.

3. Students are expected to be self-motivating in an online, asynchronous course.

Tentative Course Outline*
ISOL 532: Telecommunications and Network Security

Fall IIG, 2018

Course textbook: Network Security, Firewalls, and VPNs, 2nd edition (Stewart, 2014)

Note: Assignments in the following table are listed when they are due.

Week

Weekly Topic

Reading

Assignment Due**

#1

#.#

Network security basics, threats, and issues

Ch. 1, 2, 4; NIST SP 800-30: Guide for Conducting Risk Assessments (http://csrc.nist.gov/publications/PubsSPs.html; use the latest version)

Lab 1, 2, 3

#2

#.#

Firewall fundamentals

Ch. 2, 7

Lab 4, 5

#3

#.#

VPN fundamentals

Ch. 3, 11, 12

Lab 6

#4

#.#

Network security implementation and management

Ch. 5, 6; NIST SP 800-61: Computer Security Incident Handling Guide, http://csrc.nist.gov/publications/PubsSPs.html

Survey

MIDTERM EXAM

#5

#.#

Firewall and VPN Management Techniques

Ch. 8, 14

Lab 7, 8

#6

#.#

Firewall implementation options

Ch. 10, 13

Lab 9

#7

#.#

Future trends and best practices

Ch. 9, 15

Project: Network Security Plan

Network Lab 10

#8

#.#

Final evaluations and course review

FINAL EXAM

*ALL DUE DATES AND ASSIGNMENTS SUBJECT TO CHANGE

**All assignments are due in iLearn by 11:59pm EDT on Monday of the corresponding week…EXCEPT the last week of class when all assignments are due on the last day of class at 11:59pm EST.

© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Page 1

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Mentor
Premium Solutions
High Quality Assignments
Engineering Guru
Engineering Help
Quality Assignments
Writer Writer Name Offer Chat
Quick Mentor

ONLINE

Quick Mentor

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$43 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$47 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$42 Chat With Writer
Engineering Help

ONLINE

Engineering Help

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$24 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

American art before and after world war ii presentation - Middle english pronunciation guide - Assig 3 - ASSIGNMENT CORRECTION - Examples of feedback to students - Measuring sugar content of a liquid with a laser pointer - Quién toma fotos margarita ____ toma - Sports psychology activities for students - Duvall's developmental theory - PACES of videos; "Stressed out" by 21 pilots analysis - Wbs for restaurant project - VERY URGENT NEED in NEXT 2-3 hour - Implement into Intel Quartus softwere - Individual & dual movement HW - Reflection paper - Understanding food principles and preparation lab manual - Public relations lecture notes - Thin lens equation problems - Number sense grades 4 6 - What did you learn from this video ? - What is chronological order in writing - Lorem - Ias 40 investment property pdf - Power point presentation of capstone project - Alphabet symmetry worksheet answers - ITCC200 Week 8 Final Project - Wk8 Discussion SOCW 6443: The Use of Stimulants in the Treatment ADHD - Projected financial statement analysis - Bs 970 817m40 equivalent - Issue resolution process steps - Discover wholesale clubs - Denver international airport case study pdf - Mov project management - The best manufacturing company is considering a new investment - Novo nordisk graduate program - Ansys workbench command line - Importance of literature review in research ppt - British microlight aircraft association - Cash flow exercise questions and answers - Nanda nursing diagnosis for lymphedema - 122 bus route cairns - Willie lynch syndrome today - Medial epicondylitis special test - This is a partial adjusted trial balance of barone company - Week 6 longa healthcare - Telephone script for research recruitment - World Perspective Week 6 - 90 day bank accepted bill rate - How does hajj express the beliefs of islam - Business Action Plan | Due in 24 Hours! - Sterile processing competency forms - Midnight journal entry solution - How many syllables is while - Cases studies - Consistent carb diet foods - Case Study: Chemotherapy - Shl direct numerical test - Angus & coote garden city - Using Avast! Antivirus - Home depot customer satisfaction - Group 4 period 6 - Business Articles Every Entrepreneur Should Read - Smart extreme and restricted utilitarianism summary - Business discussion - 1984 chocolate ration quote - Breast exam soap note - Health Care Delivery Models and Nursing Practice - Http assess scsa wa edu au - Humbuggery and manipulation the art of leadership - Enterprise risk management assignment - De la salle institute napa - How to make fake blood on clothes - American govn. discussion - Accounting - Paper - How to write an oral presentation vce - Write an article - Stamford hill primary school - Rater errors in performance management - Ethanoic acid concentration in vinegar - Cinnamon soho kingly street - HRM 652 EVALUATING RESULTS AND BENEFITS - Precalculus final exam multiple choice doc - Law - Pollak 192 3 cross reference - Where do terrigenous sediments accumulate - Barwon head caravan park - Hr case study with solution ppt - Ryalls building supplies stotfold - Ammonium nitrate and sodium hydroxide observation - Community mental health team dumfries - Arq 4 - They say i say 4th edition with readings citation - Heterarchy in business - Minoan frescoes differ from egyptian frescoes - The skylark poem questions and answers - COMPARE AND CONTRAST THE TWO VERSIONS OF THE STORY OF RAMA AND SITA: THE RAMAYANA AND SITA SINGS THE BLUES - What time will it be in 65 minutes - Following are the transactions of a new company called pose-for-pics. - Discuss the importance of conducting a thorough literature review as it relates to the research process. Use a reference from scholarly literature or your text to support your primary response