Sep 07, 2024  
2023-2024 Cowley College Academic Catalog 
    
2023-2024 Cowley College Academic Catalog [ARCHIVED CATALOG]

CIS1917 NETWORK DEFENSE ESSENTIALS COURSE PROCEDURE


COWLEY COLLEGE COURSE PROCEDURE

CIS 1917- NETWORK DEFENSE ESSENTIALS
3 Credit Hours

Student Level:

This course is open to students on the college level in either the Freshman or Sophomore year.

Catalog Description:

CIS1917 - Network Defense Essentials (3 hrs.)

This course will introduce students to information security concepts to establish and govern minimum standards for the successful completion of credentialing entry-level information security specialist examination in network security measures.

KRSN: If Kansas Regents Shared Number list that here

Course Classification: 3 Hr. Lecture

Prerequisites:
List prerequisite information here including course number and name and any other required information. If background check is required, indicate that here too.

Co-requisites:
List any Co-requisites here or state NONE

Controlling Purpose:

The purpose of this course is to provide an introduction to basic information security concepts.  These concepts provide a foundation for future studies in courses related to computer science and computer engineering.

Learner Outcomes:

Upon completion of the course, the student will:

  1. Discuss fundamental concepts of network security, including Information Assurance (IA) principles, network defense challenges, defense approaches, security controls, and review essential network security protocols.
  2. Discuss access control principles, terminologies, and models, and describe Identity and Access Management (IAM) concepts.
  3. Examine various administrative network defense controls, including frameworks, laws, acts, and security policies.
  4. Examine various physical network defense controls, including physical security controls, workplace security, and environmental controls.
  5. Examine various technical network defense controls, including network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware.
  6. Comprehend fundamental virtualization concepts, Virtualization Security Concerns, cloud computing, and suggest security best practices.
  7. Explain wireless network fundamentals, different types of wireless encryption, and suggest security measures.
  8. Discuss various mobile device connection methods, Mobile Device Management concepts, common mobile usage policies, examine different security risks, and review general security guidelines and best practices for mobile platforms.
  9. Discuss working of IoT devices, application areas, communication models, IoT security principles, IoT framework security considerations, IoT device management, and identify IoT security best practices.
  10. Discuss cryptography techniques, various cryptographic algorithms, and Public Key Infrastructure (PKI), and use various cryptography tools to protect information.
  11. Discuss data security concepts, the importance of data encryption, data loss prevention, and compare different data backup concepts and technologies.
  12. Discuss the need and advantages of network traffic monitoring, determine baseline traffic signatures for normal and suspicious network traffic, and perform network monitoring for suspicious traffic.

Unit Outcomes for Criterion Based Evaluation:

The following outline defines the minimum core content not including the final examination period.  Instructors may add other material as time allows.

UNIT 1: Network Security Fundamentals

Outcomes: Upon completion of this unit, the students will be able to

  • List the Goals of Network Defense
  • Describe Information Assurance (IA) Principles
  • Contrast the Benefits and Challenges of Network Defense
  • Explain Different Types of Network Defense Approaches
  • Describe the Different Network Security Controls
  • Define the Different Types of Network Security Protocols

UNIT 2:  Identification, Authentication, and Authorization

Outcomes: Upon completion of this unit, the students will be able to

  • Understanding the Terminology, Principles, and Models of Access Control
  • Understanding Identity and Access Management (IAM)
  • Understanding User Access Management
  • Overview of Different Types of Authentication
  • Understanding User Accounting
  • Overview of Different Types of Authorization

UNIT 3: Network Security Controls - Administrative Controls

Outcomes: Upon completion of this unit, the students will be able to

  • Understand various regulatory frameworks, laws, and acts
  • Understand why organizations need compliance
  • Describe the need for and characteristics of good security policy
  • Explain how to design and develop security policies
  • Understand the different types of security policies
  • Understand the different types of security and awareness training

UNIT 4: Network Security Controls - Physical Controls

Outcomes: Upon completion of this unit, the students will be able to

  • Understand the importance of physical security
  • Understand the physical security attack vectors
  • Describe the various types of physical security controls
  • Explain the importance of workplace security
  • Understand physical security policy
  • Understand the various environmental controls

UNIT 5: Network Security Controls - Technical Controls

Outcomes: Upon completion of this unit, the students will be able to

  • Understand network segmentation and its types
  • Describe the different types of firewalls and their roles
  • Describe the different types of IDS/IPS and their roles
  • Explain the different types of honeypots
  • Understand the different types of proxy servers and their benefits
  • Understand the fundamentals of virtual private networks (VPNs) and their importance in network security
  • Explain security incident and event management (SIEM)
  • Understand user behavior analytics (UBA)
  • Apply various antivirus/anti-malware software

UNIT 6: Virtualization and Cloud Computing

Outcomes: Upon completion of this unit, the students will be able to

  • Understand virtualization, its components, and virtualization enablers
  • Understand OS virtualization security and concerns
  • Understand the best practices for OS virtualization security
  • Explain cloud computing and its benefits
  • Understand different types of cloud computing services
  • Explain cloud deployment models
  • Understand importance of cloud security and its best practices

UNIT 7: Wireless Network Security

Outcomes: Upon completion of this unit, the students will be able to

  • Understand wireless terminology, wireless networks, and wireless standards
  • Understand the wireless network topologies and classification of wireless networks
  • Understand the components of a wireless network
  • Explain the wireless network encryption mechanisms
  • Understand the different types of wireless network authentication methods
  • Explain wireless network security measures and wireless security tools

UNIT 8: Mobile Device Security

Outcomes: Upon completion of this unit, the students will be able to

  • Understand the various mobile device connection methods
  • Understand the concepts of mobile device management
  • Understand the common mobile use approaches in enterprises
  • Understand the security risk and guidelines associated with enterprise mobile usage policies
  • Understand enterprise-level mobile security management solutions
  • Explain the general security guidelines and best practices for mobile platforms

UNIT 9: IoT Device Security

Outcomes: Upon completion of this unit, the students will be able to

  • Understand the IoT and why organizations opt for IoT-enabled environments
  • Describe the IoT application areas and IoT devices
  • Describe the IoT architecture and IoT communication models
  • Understand the security in IoT-enabled environments and stack-wise IoT security principles
  • Understand the security considerations of the IoT framework
  • Understand IoT device management
  • Understand the best practices and tools for IoT security

UNIT 10: Cryptography and PKI

Outcomes: Upon completion of this unit, the students will be able to

 

  • Describe cryptographic techniques
  • Understand the different encryption algorithms
  • Understand the different hashing algorithms
  • Use different cryptography tools and hash calculators
  • Explain public key infrastructure (PKI)
  • Understand digital signatures and digital certificates

UNIT 11: Data Security

Outcomes: Upon completion of this unit, the students will be able to

  • Understand data security and its importance
  • Understand the different data security technologies
  • Explain the various security controls for data encryption
  • Use different disk encryption, file encryption, and removable-media encryption tools
  • Explain methods and tools for data backup and retention
  • Understand data loss prevention (DLP) and DLP solutions

UNIT 12: Network Traffic Monitoring

Outcomes: Upon completion of this unit, the students will be able to

  • Understand the need for and advantages of network traffic monitoring
  • Understand the network traffic signatures
  • Describe the categories of suspicious traffic signatures
  • Explain the attack signature analysis techniques
  • Understand network monitoring for suspicious traffic
  • Understand the various network monitoring tools

Projects Required:

Varies, refer to syllabus.

Textbook:

Contact Bookstore for current textbook.

Materials/Equipment Required:

None

Attendance Policy:

Students should adhere to the attendance policy outlined by the instructor in the course syllabus.

Grading Policy:

The grading policy will be outlined by the instructor in the course syllabus.

Maximum class size:

Based on classroom occupancy

Course Time Frame:

The U.S. Department of Education, Higher Learning Commission and the Kansas Board of Regents define credit hour and have specific regulations that the college must follow when developing, teaching and assessing the educational aspects of the college.  A credit hour is an amount of work represented in intended learning outcomes and verified by evidence of student achievement that is an institutionally-established equivalency that reasonably approximates not less than one hour of classroom or direct faculty instruction and a minimum of two hours of out-of-class student work for approximately fifteen weeks for one semester hour of credit or an equivalent amount of work over a different amount of time.  The number of semester hours of credit allowed for each distance education or blended hybrid courses shall be assigned by the college based on the amount of time needed to achieve the same course outcomes in a purely face-to-face format.

Refer to the following policies:

402.00 Academic Code of Conduct

263.00 Student Appeal of Course Grades

403.00 Student Code of Conduct

Disability Services Program:

Cowley College, in recognition of state and federal laws, will accommodate a student with a documented disability.  If a student has a disability which may impact work in this class and which requires accommodations, contact the Disability Services Coordinator.

Created 3/30/2023