2022-2023 Catalog 
    
    Apr 18, 2024  
2022-2023 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CSTC 237 - Network Security

3 Credit: (2 lecture, 2 lab, 0 clinical) 4 Contact Hours: [Pre- or co-requisite: CSTC 127  or CSTC 171 ]


This course provides practical techniques for implementing security in today’s computer networks. Current risks and threats to an organization’s data, along with methods of safeguarding this data, are discussed. Students implement basic security services on various types of computer networks. Material is relevant to CompTIA’s Security+ Certification Exam.
OFFERED: fall semesters

Course Goals/ Objectives/ Competencies:
Goal 1:  Identify computer network security threats.

  1. Detail the variation in threats posed by a virus, worms, and trojan horses.
  2. Define and differentiate the function of Spyware and Spam.
  3. Describe adware security threats and its relationship to malware.
  4. Detail the similarities and differences of rootkits and botnets.

Goal 2:  Implement appropriate measures to establish computer network security.

  1. Install and maintain service packs, hotfixes and patches.
  2. Identify and establish appropriate group policies.
  3. Install and maintain antivirus, firewalls, and antispam applications.

Goal 3:  Identify network design elements subject to security threats.

  1. Describe how the TCP/IP Protocol stack can be vulnerable to security threats.
  2. Determine threats by spoofing, DoS, and Man-in-the middle and measure to address them.
  3. Describe network vulnerabilities from weak passwords and how to secure from them.
  4. Describe the process of establishing backdoors and their potential threat from external exploits.
  5. Outline threats specifically encountered via wireless infrastructure.

Goal 4:  Apply appropriate network tools to facilitate network security.

  1. Create network designs which appropriately utilized DMZ, NAT, VLANs and standard subnetting.
  2. Incorporate the use of firewalls and proxy servers to secure from external threats.
  3. Develop content filters and protocol analyzers to capture and analyze incoming traffic.

Goal 5:  Apply industry best practices for access control.

  1. Create implicit deny, least privilege, and time of day restrictions to control access.
  2. Establish appropriate account expiration settings.
  3. Create authentication procedures using RADIUS, CHAP, and Kerberos.

Goal 6:  Explain general cryptography methods for wired and wireless networks.

  1. Describe and differentiate between Key management, Confidentiality, and Digital certificates.
  2. Define the purpose and application of SSL.TSL, PPTP, HTTPS, L2TP, and IPSEC.

Goal 7:  Explain redundancy planning and its components.

  1. Describe various techniques for establishing system backups.
  2. Define RAID and UPS technology and how they support a fault tolerance strategy.

Goal 8:  Identify legislation and organizational policies for network security.

  1. Create policies which incorporate secure disposal of computers.
  2. Define end-user organizational acceptable use policies.
  3. Develop a plan for personal training.
  4. Describe and differentiate between due care and due diligence.



Add to Portfolio (opens a new window)