Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Network security firewalls and vpns second edition pdf

23/11/2021 Client: muhammad11 Deadline: 2 Day

Syllabus: Access Control, Authentication, and Public Key Infrastructure

Course Summary
Course Number and Name
ISOL 532 – Telecommunications and Network Security

Course Term and Delivery
2018 – Fall IIG

Asynchronous Online Course

Course Instructor
Dr. Jamia S. Mills, Adjunct Professor

Email: Jamia.mills@ucumberlands.edu

Office Hours: By Appointment

Catalog Course Description
Various network security-related issues are introduced and examined. Different types of VPNs for securing data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to implement a VPN. Other topics include the utility of firewalls in tackling security problems and the limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a firewall and the functionality of a firewall.

Course Objectives
Course Competencies/ Learning Objectives

Course Learning Objectives

Major Instructional Areas

Assessment Method

Explain the fundamental concepts of network security.

Network security risks, threats, and vulnerabilities

Exams, DB Posts, Project

Describe the fundamental functions performed by firewalls.

Firewall types, functions, uses, and deployment strategies

Exams, DB Posts, Project

Describe the foundational concepts of VPNs.

VPN types, functions, uses, and deployment strategies

Exams, DB Posts, Project

Recognize the impact that malicious exploits and attacks have on network security.

Exams, DB Posts, Project

Describe network security implementation strategies and the roles each can play within the security life cycle.

Network-centric TCP/IP protocols and applications

Exams, DB Posts, Project

Identify network security management best practices and strategies for responding when security measures fail.

Layered network security strategies; secure network design; best practices and strategies for network security and incident response

Exams, DB Posts, Project

Manage and monitor firewalls and understand their limitations.

Exams, DB Posts, Project

Assess firewall design strategies and apply firewall management best practices.

Exams, DB Posts, Project

Appraise firewall and other security options available for personal and small office/home office (SOHO) environments.

Exams, DB Posts, Project

Appraise elements of VPN implementation and management.

Exams, DB Posts, Project

Describe common VPN technologies.

Exams, DB Posts, Project

Follow the creation of an example firewall implementation and an example VPN implementation.

Exams, DB Posts, Project

Evaluate available resources and trends in network security.

Exams, DB Posts, Project

Course Structure
· Watch weekly lecture

· Participate in class discussion via iLearn forums

· Reading assigned texts

· Complete quizzes based on assigned reading and lecture

· Complete cases based upon a given scenario

· Complete homework assignments from the text and other sources

Learning Materials and References
Required Resources
Textbook(s) Required:

· Stewart, James M. Network Security, Firewalls, and VPNs, 2nd ed. Burlington, MA: Jones & Bartlett, 2014

· Virtual Security Cloud Labs*

· Student Lab Manual (available within the virtual lab environment) *

* These resources are available if your educational institution purchased the Jones & Bartlett Learning lab manuals along with the courseware.

Recommended Materials/Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.

Books, Professional Journals

· Seymour Bosworth, et al.

Computer Security Handbook, 5th ed. (Chapters 3, 21, and 26)

· Douglas E Comer

Internetworking with TCP/IP, 5th ed.

· Anne Henmi (ed). Firewall Policies and VPN Configurations (Chapters 2 and 5)

· Jonathan Katz

Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC

· Mark Lewis

Comparing, Designing, and Deploying VPNs

· John Mairs

VPNs: A Beginner's Guide

· Noonan et al.

Firewall Fundamentals

· Michael Rash Linux Firewalls: Attack Detection and Response With Iptables, Psad, and Fwsnort

· Rhodes-Ousley et al.

Network Security: The Complete Reference

· Debra L. Shinder, et al. Scene of the Cybercrime, 2nd ed.

· Thomas Shinder The Best Damn Firewall Book Period, 2nd ed.

· W. Richard Stevens et al.

TCP/IP Illustrated

· James M. Stewart, et al. CISSP: Certified Information Systems Security Professional Study Guide, 5th ed.

· Keith Strassberg et al.

Firewalls: The Complete Reference

· John R. Vacca, et al Firewalls: Jumpstart for Network and Systems Administrators

· Michael E. Whitman et al.

Guide to Firewalls and Network Security

· Ruixi Yuan

Virtual Private Networks: Technologies and Solutions

· Elizabeth D. Zwicky et al.

Building Internet Firewalls, 2nd ed.

Other References
· Common Vulnerabilities and Exposures (CVE)

http://cve.mitre.org

· Information Assurance Support Environment (IASE): Security Technical Implementation Guides (STIGS)

http://iase.disa.mil/stigs/index.html

· Chris May, et al.

Advanced Information Assurance Handbook

http://www.dtic.mil/dtic/tr/fulltext/u2/a443478.pdf

Professional Associations

· CERT

This Web site provides assistance in understanding and handling security vulnerabilities. It also provides research tools on long-term changes in networked systems and gives training assistance to improve security.

http://www.cert.org/

· International Association of Privacy Professionals (IAPP)

This Web site provides opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice.

https://www.privacyassociation.org/

· International Information Systems Security Certification Consortium, Inc., (ISC)²®

This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools.

http://www.isc2.org/

· ISACA

This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of like-minded colleagues and contains professional resources and technical/managerial publications.

https://www.isaca.org/Pages/default.aspx

· National Institute of Standards and Technology (NIST)

This Web site provides access to subject matter experts and also facilitates in research. It also provides career-building resources and opportunities.

http://www.nist.gov/index.html

· National Security Agency/Central Security Service (NSA/CSS)

This Web site provides guidance on information assurance security solutions and also provides insights on risks, vulnerabilities, mitigations, and threats. It also provides information on cryptologic support. http://www.nsa.gov/index.shtml

· SANS: Computer Security Training, Network Research & Resources

This Web site provides information on computer security training through several delivery methods like live and virtual conferences, mentors, online, and onsite. It also provides certification and numerous free security resources. http://www.sans.org

Evaluation and Grading
Course Assignments and Evaluation Criteria
Grading will be based on accumulated points of each graded requirement in the course distributed as described in the table below:

Required Assignments*

Assignment

Description

Weight

Exams (2)

Each exam will consist of multiple choice, short answer questions, discussion questions, and other security related questions. Exam items will be derived primarily from lectures and readings. Exams will be available through iLearn, but must be completed independently. See course calendar for tentative due dates.

55%

Labs

Labs will be assigned weekly to complement the required readings.

20%

Project

Students will complete a network security plan project.

25%

TOTAL

100%

* Assignments may change at the discretion of the professor and changes in the assignments will be announced in class. Students are responsible for noting and completing any changes in assignments.

Grade Conversion
The final grades will be calculated from the percentages earned in the course, as follows:

Grade

Percentage

A

90–100%

B

80–89.5%

C

70–79.5%

F

<69.5%

Course Expectations
Class Participation
Students are expected to:

1. Be fully prepared for each class session by studying the assigned reading material and preparation of the material assigned.

2. Participate in group discussions, assignments, and panel discussions.

3. Complete specific assignments when due and in a professional manner.

4. Take exams when specified on the attached course schedule

Academic Integrity
At a Christian liberal arts University committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

a. cheating - using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities

b. lying—falsifying, fabricating, or forging information in either written, spoken, or video presentations

c. plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Students with Disabilities
University of the Cumberlands accepts students with certified disabilities and provides reasonable accommodations for their certified needs in the online classroom or in other areas. For accommodations to be awarded, a student must submit a completed Accommodations Application form and provide documentation of the disability. Students who may have a disability meriting an academic accommodation should contact the Disability Services Coordinator (Nate Clouse, in Boswell Campus Center) to ensure that their needs are properly evaluated and that documentation is on file. Any accommodations for disabilities must be re-certified each bi-term by the Disability Services Coordinator before course adjustments are made by individual instructors.

Student Responsibilities
1. Students are expected to login several times per week to participate in class discussions.

2. Students are expected to find out if any changes have been made in the class or assignment schedule.

3. Students are expected to be self-motivating in an online, asynchronous course.

Tentative Course Outline*
ISOL 532: Telecommunications and Network Security

Fall IIG, 2018

Course textbook: Network Security, Firewalls, and VPNs, 2nd edition (Stewart, 2014)

Note: Assignments in the following table are listed when they are due.

Week

Weekly Topic

Reading

Assignment Due**

#1

#.#

Network security basics, threats, and issues

Ch. 1, 2, 4; NIST SP 800-30: Guide for Conducting Risk Assessments (http://csrc.nist.gov/publications/PubsSPs.html; use the latest version)

Lab 1, 2, 3

#2

#.#

Firewall fundamentals

Ch. 2, 7

Lab 4, 5

#3

#.#

VPN fundamentals

Ch. 3, 11, 12

Lab 6

#4

#.#

Network security implementation and management

Ch. 5, 6; NIST SP 800-61: Computer Security Incident Handling Guide, http://csrc.nist.gov/publications/PubsSPs.html

Survey

MIDTERM EXAM

#5

#.#

Firewall and VPN Management Techniques

Ch. 8, 14

Lab 7, 8

#6

#.#

Firewall implementation options

Ch. 10, 13

Lab 9

#7

#.#

Future trends and best practices

Ch. 9, 15

Project: Network Security Plan

Network Lab 10

#8

#.#

Final evaluations and course review

FINAL EXAM

*ALL DUE DATES AND ASSIGNMENTS SUBJECT TO CHANGE

**All assignments are due in iLearn by 11:59pm EDT on Monday of the corresponding week…EXCEPT the last week of class when all assignments are due on the last day of class at 11:59pm EST.

© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Page 1

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Mentor
Premium Solutions
High Quality Assignments
Engineering Guru
Engineering Help
Quality Assignments
Writer Writer Name Offer Chat
Quick Mentor

ONLINE

Quick Mentor

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$43 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$47 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$42 Chat With Writer
Engineering Help

ONLINE

Engineering Help

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$24 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to calculate the wavelength of light emitted - Creating value in a dynamic business environment - Discuss at least two backup strategies - Cozy console heater manual - TIMEMAPPER ENTRY 4 (ENCYCLOPEDIA STYLE) CAREFULLY READ ATTACHED DOC. - Chap. 3 Q HR - Comm 171 centennial college - Qut library room booking - Life is like a walking shadow - Harley cannard net worth - Command cruise control ap60b - Rent control pros and cons economics - Rule of nines child - Drury precision engineering ltd evotech performance - Aacn essentials for master's education - Food additives and unhealthiness speech - Check the Attached work and let me know if you can be able to do the work - Shell organizational structure - The telegram iain crichton smith short story - Government and politics grade boundaries - Hoselink super jet washer - Sin2x in terms of tan - New world encyclopedia book - East leeds snooker club - Sunpower e series vs x series - Target corporation capital budgeting case study solution - Becoming members of society aaron devor - Convert 60 miles hour to ft sec - Ethics and accountability in public administration - I need neImportance of emotional quotient in your success need a more then half page assignment. - 1mm2 wire current rating - Feature article example for students - Case 3 walmart manages ethics and compliance challenges answers - Max workouts pdf torrent - Funny in farsi the f word - Celery cross section microscope - Marketing Essay - Formulating Leadership - Setting up a Presentation - Excel 2016 module 10 sam project 1a - The walt disney company the entertainment king case analysis - North norfolk council planning - Contraceptives - +91-8306951337 kala jadu specialist astrologer IN Rajahmundry - The cask of amontillado answers to questions - When a firm is experiencing diseconomies of scale - Preliminary Care Coordination Plan - Pied piper of tucson - Life after life jill mccorkle summary - Korman company has the following securities in its portfolio - Meat glue used in canada - What is access pay - Us history abc book project - Dl120 gen9 ilo port - Auditing & assurance services a systematic approach 9th edition - Hierarchical page table example - Training the receptionist juniper bell read online - Matterhorn health simulation press release - .179 as a fraction - Parallel operation of alternators sample problems - Call optus stolen phone - In order to be binding a price ceiling must - Snickers swot analysis - Performance lawn equipment case answers - Discussion Board ASAP - Jeppesen charts manual pdf - Pea plant crosses worksheet answers - Single equation regression model - Quantitative Evaluation 8381 - Fishbourne roman palace rooms - Cons of continuous training - Books to teach phonemic awareness - Science lab questions and answers - HW - Difference between batch and continuous distillation - The usefulness of mendeleev's periodic table was confirmed by - Index of shark tank season - B - Australian seniors insurance agency - Blood type inheritance worksheet - What is an algorithim - Assignment - National union of teachers - Philosophy101 - Data Mining - Why did the tay bridge collapse - Grapes of wrath chapter 3 analysis - Fdi in retail sector ppt - Iom report the future of nursing leading change advancing health - Before you know it john bargh pdf - Is hacking that does no direct damage a victimless crime - Forensic accounting rufus miller hahn - Schedule ca 540 line 37 column b instructions - Coas physics 1 teacher resources worksheet 18 - Boral roof tile brochure - Qub ac uk qol - Bws evans and tate - Research health - Does sugar dissolve in methylated spirits - The kgb and the world pdf download - How to write a siop lesson plan