Syllabus: Access Control, Authentication, and Public Key Infrastructure
Course Summary
Course Number and Name
ISOL 532 – Telecommunications and Network Security
Course Term and Delivery
2018 – Fall IIG
Asynchronous Online Course
Course Instructor
Dr. Jamia S. Mills, Adjunct Professor
Email: Jamia.mills@ucumberlands.edu
Office Hours: By Appointment
Catalog Course Description
Various network security-related issues are introduced and examined. Different types of VPNs for securing data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to implement a VPN. Other topics include the utility of firewalls in tackling security problems and the limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a firewall and the functionality of a firewall.
Course Objectives
Course Competencies/ Learning Objectives
Course Learning Objectives
Major Instructional Areas
Assessment Method
Explain the fundamental concepts of network security.
Network security risks, threats, and vulnerabilities
Exams, DB Posts, Project
Describe the fundamental functions performed by firewalls.
Firewall types, functions, uses, and deployment strategies
Exams, DB Posts, Project
Describe the foundational concepts of VPNs.
VPN types, functions, uses, and deployment strategies
Exams, DB Posts, Project
Recognize the impact that malicious exploits and attacks have on network security.
Exams, DB Posts, Project
Describe network security implementation strategies and the roles each can play within the security life cycle.
Network-centric TCP/IP protocols and applications
Exams, DB Posts, Project
Identify network security management best practices and strategies for responding when security measures fail.
Layered network security strategies; secure network design; best practices and strategies for network security and incident response
Exams, DB Posts, Project
Manage and monitor firewalls and understand their limitations.
Exams, DB Posts, Project
Assess firewall design strategies and apply firewall management best practices.
Exams, DB Posts, Project
Appraise firewall and other security options available for personal and small office/home office (SOHO) environments.
Exams, DB Posts, Project
Appraise elements of VPN implementation and management.
Exams, DB Posts, Project
Describe common VPN technologies.
Exams, DB Posts, Project
Follow the creation of an example firewall implementation and an example VPN implementation.
Exams, DB Posts, Project
Evaluate available resources and trends in network security.
Exams, DB Posts, Project
Course Structure
· Watch weekly lecture
· Participate in class discussion via iLearn forums
· Reading assigned texts
· Complete quizzes based on assigned reading and lecture
· Complete cases based upon a given scenario
· Complete homework assignments from the text and other sources
Learning Materials and References
Required Resources
Textbook(s) Required:
· Stewart, James M. Network Security, Firewalls, and VPNs, 2nd ed. Burlington, MA: Jones & Bartlett, 2014
· Virtual Security Cloud Labs*
· Student Lab Manual (available within the virtual lab environment) *
* These resources are available if your educational institution purchased the Jones & Bartlett Learning lab manuals along with the courseware.
Recommended Materials/Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
Books, Professional Journals
· Seymour Bosworth, et al.
Computer Security Handbook, 5th ed. (Chapters 3, 21, and 26)
· Douglas E Comer
Internetworking with TCP/IP, 5th ed.
· Anne Henmi (ed). Firewall Policies and VPN Configurations (Chapters 2 and 5)
· Jonathan Katz
Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC
· Mark Lewis
Comparing, Designing, and Deploying VPNs
· John Mairs
VPNs: A Beginner's Guide
· Noonan et al.
Firewall Fundamentals
· Michael Rash Linux Firewalls: Attack Detection and Response With Iptables, Psad, and Fwsnort
· Rhodes-Ousley et al.
Network Security: The Complete Reference
· Debra L. Shinder, et al. Scene of the Cybercrime, 2nd ed.
· Thomas Shinder The Best Damn Firewall Book Period, 2nd ed.
· W. Richard Stevens et al.
TCP/IP Illustrated
· James M. Stewart, et al. CISSP: Certified Information Systems Security Professional Study Guide, 5th ed.
· Keith Strassberg et al.
Firewalls: The Complete Reference
· John R. Vacca, et al Firewalls: Jumpstart for Network and Systems Administrators
· Michael E. Whitman et al.
Guide to Firewalls and Network Security
· Ruixi Yuan
Virtual Private Networks: Technologies and Solutions
· Elizabeth D. Zwicky et al.
Building Internet Firewalls, 2nd ed.
Other References
· Common Vulnerabilities and Exposures (CVE)
http://cve.mitre.org
· Information Assurance Support Environment (IASE): Security Technical Implementation Guides (STIGS)
http://iase.disa.mil/stigs/index.html
· Chris May, et al.
Advanced Information Assurance Handbook
http://www.dtic.mil/dtic/tr/fulltext/u2/a443478.pdf
Professional Associations
· CERT
This Web site provides assistance in understanding and handling security vulnerabilities. It also provides research tools on long-term changes in networked systems and gives training assistance to improve security.
http://www.cert.org/
· International Association of Privacy Professionals (IAPP)
This Web site provides opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice.
https://www.privacyassociation.org/
· International Information Systems Security Certification Consortium, Inc., (ISC)²®
This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools.
http://www.isc2.org/
· ISACA
This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of like-minded colleagues and contains professional resources and technical/managerial publications.
https://www.isaca.org/Pages/default.aspx
· National Institute of Standards and Technology (NIST)
This Web site provides access to subject matter experts and also facilitates in research. It also provides career-building resources and opportunities.
http://www.nist.gov/index.html
· National Security Agency/Central Security Service (NSA/CSS)
This Web site provides guidance on information assurance security solutions and also provides insights on risks, vulnerabilities, mitigations, and threats. It also provides information on cryptologic support. http://www.nsa.gov/index.shtml
· SANS: Computer Security Training, Network Research & Resources
This Web site provides information on computer security training through several delivery methods like live and virtual conferences, mentors, online, and onsite. It also provides certification and numerous free security resources. http://www.sans.org
Evaluation and Grading
Course Assignments and Evaluation Criteria
Grading will be based on accumulated points of each graded requirement in the course distributed as described in the table below:
Required Assignments*
Assignment
Description
Weight
Exams (2)
Each exam will consist of multiple choice, short answer questions, discussion questions, and other security related questions. Exam items will be derived primarily from lectures and readings. Exams will be available through iLearn, but must be completed independently. See course calendar for tentative due dates.
55%
Labs
Labs will be assigned weekly to complement the required readings.
20%
Project
Students will complete a network security plan project.
25%
TOTAL
100%
* Assignments may change at the discretion of the professor and changes in the assignments will be announced in class. Students are responsible for noting and completing any changes in assignments.
Grade Conversion
The final grades will be calculated from the percentages earned in the course, as follows:
Grade
Percentage
A
90–100%
B
80–89.5%
C
70–79.5%
F
<69.5%
Course Expectations
Class Participation
Students are expected to:
1. Be fully prepared for each class session by studying the assigned reading material and preparation of the material assigned.
2. Participate in group discussions, assignments, and panel discussions.
3. Complete specific assignments when due and in a professional manner.
4. Take exams when specified on the attached course schedule
Academic Integrity
At a Christian liberal arts University committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
a. cheating - using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities
b. lying—falsifying, fabricating, or forging information in either written, spoken, or video presentations
c. plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation
Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.
Students with Disabilities
University of the Cumberlands accepts students with certified disabilities and provides reasonable accommodations for their certified needs in the online classroom or in other areas. For accommodations to be awarded, a student must submit a completed Accommodations Application form and provide documentation of the disability. Students who may have a disability meriting an academic accommodation should contact the Disability Services Coordinator (Nate Clouse, in Boswell Campus Center) to ensure that their needs are properly evaluated and that documentation is on file. Any accommodations for disabilities must be re-certified each bi-term by the Disability Services Coordinator before course adjustments are made by individual instructors.
Student Responsibilities
1. Students are expected to login several times per week to participate in class discussions.
2. Students are expected to find out if any changes have been made in the class or assignment schedule.
3. Students are expected to be self-motivating in an online, asynchronous course.
Tentative Course Outline*
ISOL 532: Telecommunications and Network Security
Fall IIG, 2018
Course textbook: Network Security, Firewalls, and VPNs, 2nd edition (Stewart, 2014)
Note: Assignments in the following table are listed when they are due.
Week
Weekly Topic
Reading
Assignment Due**
#1
#.#
Network security basics, threats, and issues
Ch. 1, 2, 4; NIST SP 800-30: Guide for Conducting Risk Assessments (http://csrc.nist.gov/publications/PubsSPs.html; use the latest version)
Lab 1, 2, 3
#2
#.#
Firewall fundamentals
Ch. 2, 7
Lab 4, 5
#3
#.#
VPN fundamentals
Ch. 3, 11, 12
Lab 6
#4
#.#
Network security implementation and management
Ch. 5, 6; NIST SP 800-61: Computer Security Incident Handling Guide, http://csrc.nist.gov/publications/PubsSPs.html
Survey
MIDTERM EXAM
#5
#.#
Firewall and VPN Management Techniques
Ch. 8, 14
Lab 7, 8
#6
#.#
Firewall implementation options
Ch. 10, 13
Lab 9
#7
#.#
Future trends and best practices
Ch. 9, 15
Project: Network Security Plan
Network Lab 10
#8
#.#
Final evaluations and course review
FINAL EXAM
*ALL DUE DATES AND ASSIGNMENTS SUBJECT TO CHANGE
**All assignments are due in iLearn by 11:59pm EDT on Monday of the corresponding week…EXCEPT the last week of class when all assignments are due on the last day of class at 11:59pm EST.
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 1