COWLEY COLLEGE COURSE PROCEDURE
CIS 1917- NETWORK DEFENSE ESSENTIALS
3 Credit Hours
Student Level:
This course is open to students on the college level in either the Freshman or Sophomore year.
Catalog Description:
CIS1917 - Network Defense Essentials (3 hrs.)
This course will introduce students to information security concepts to establish and govern minimum standards for the successful completion of credentialing entry-level information security specialist examination in network security measures.
KRSN: If Kansas Regents Shared Number list that here
Course Classification: 3 Hr. Lecture
Prerequisites:
List prerequisite information here including course number and name and any other required information. If background check is required, indicate that here too.
Co-requisites:
List any Co-requisites here or state NONE
Controlling Purpose:
The purpose of this course is to provide an introduction to basic information security concepts. These concepts provide a foundation for future studies in courses related to computer science and computer engineering.
Learner Outcomes:
Upon completion of the course, the student will:
- Discuss fundamental concepts of network security, including Information Assurance (IA) principles, network defense challenges, defense approaches, security controls, and review essential network security protocols.
- Discuss access control principles, terminologies, and models, and describe Identity and Access Management (IAM) concepts.
- Examine various administrative network defense controls, including frameworks, laws, acts, and security policies.
- Examine various physical network defense controls, including physical security controls, workplace security, and environmental controls.
- Examine various technical network defense controls, including network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware.
- Comprehend fundamental virtualization concepts, Virtualization Security Concerns, cloud computing, and suggest security best practices.
- Explain wireless network fundamentals, different types of wireless encryption, and suggest security measures.
- Discuss various mobile device connection methods, Mobile Device Management concepts, common mobile usage policies, examine different security risks, and review general security guidelines and best practices for mobile platforms.
- Discuss working of IoT devices, application areas, communication models, IoT security principles, IoT framework security considerations, IoT device management, and identify IoT security best practices.
- Discuss cryptography techniques, various cryptographic algorithms, and Public Key Infrastructure (PKI), and use various cryptography tools to protect information.
- Discuss data security concepts, the importance of data encryption, data loss prevention, and compare different data backup concepts and technologies.
- Discuss the need and advantages of network traffic monitoring, determine baseline traffic signatures for normal and suspicious network traffic, and perform network monitoring for suspicious traffic.
Unit Outcomes for Criterion Based Evaluation:
The following outline defines the minimum core content not including the final examination period. Instructors may add other material as time allows.
UNIT 1: Network Security Fundamentals
Outcomes: Upon completion of this unit, the students will be able to
- List the Goals of Network Defense
- Describe Information Assurance (IA) Principles
- Contrast the Benefits and Challenges of Network Defense
- Explain Different Types of Network Defense Approaches
- Describe the Different Network Security Controls
- Define the Different Types of Network Security Protocols
UNIT 2: Identification, Authentication, and Authorization
Outcomes: Upon completion of this unit, the students will be able to
- Understanding the Terminology, Principles, and Models of Access Control
- Understanding Identity and Access Management (IAM)
- Understanding User Access Management
- Overview of Different Types of Authentication
- Understanding User Accounting
- Overview of Different Types of Authorization
UNIT 3: Network Security Controls - Administrative Controls
Outcomes: Upon completion of this unit, the students will be able to
- Understand various regulatory frameworks, laws, and acts
- Understand why organizations need compliance
- Describe the need for and characteristics of good security policy
- Explain how to design and develop security policies
- Understand the different types of security policies
- Understand the different types of security and awareness training
UNIT 4: Network Security Controls - Physical Controls
Outcomes: Upon completion of this unit, the students will be able to
- Understand the importance of physical security
- Understand the physical security attack vectors
- Describe the various types of physical security controls
- Explain the importance of workplace security
- Understand physical security policy
- Understand the various environmental controls
UNIT 5: Network Security Controls - Technical Controls
Outcomes: Upon completion of this unit, the students will be able to
- Understand network segmentation and its types
- Describe the different types of firewalls and their roles
- Describe the different types of IDS/IPS and their roles
- Explain the different types of honeypots
- Understand the different types of proxy servers and their benefits
- Understand the fundamentals of virtual private networks (VPNs) and their importance in network security
- Explain security incident and event management (SIEM)
- Understand user behavior analytics (UBA)
- Apply various antivirus/anti-malware software
UNIT 6: Virtualization and Cloud Computing
Outcomes: Upon completion of this unit, the students will be able to
- Understand virtualization, its components, and virtualization enablers
- Understand OS virtualization security and concerns
- Understand the best practices for OS virtualization security
- Explain cloud computing and its benefits
- Understand different types of cloud computing services
- Explain cloud deployment models
- Understand importance of cloud security and its best practices
UNIT 7: Wireless Network Security
Outcomes: Upon completion of this unit, the students will be able to
- Understand wireless terminology, wireless networks, and wireless standards
- Understand the wireless network topologies and classification of wireless networks
- Understand the components of a wireless network
- Explain the wireless network encryption mechanisms
- Understand the different types of wireless network authentication methods
- Explain wireless network security measures and wireless security tools
UNIT 8: Mobile Device Security
Outcomes: Upon completion of this unit, the students will be able to
- Understand the various mobile device connection methods
- Understand the concepts of mobile device management
- Understand the common mobile use approaches in enterprises
- Understand the security risk and guidelines associated with enterprise mobile usage policies
- Understand enterprise-level mobile security management solutions
- Explain the general security guidelines and best practices for mobile platforms
UNIT 9: IoT Device Security
Outcomes: Upon completion of this unit, the students will be able to
- Understand the IoT and why organizations opt for IoT-enabled environments
- Describe the IoT application areas and IoT devices
- Describe the IoT architecture and IoT communication models
- Understand the security in IoT-enabled environments and stack-wise IoT security principles
- Understand the security considerations of the IoT framework
- Understand IoT device management
- Understand the best practices and tools for IoT security
UNIT 10: Cryptography and PKI
Outcomes: Upon completion of this unit, the students will be able to
- Describe cryptographic techniques
- Understand the different encryption algorithms
- Understand the different hashing algorithms
- Use different cryptography tools and hash calculators
- Explain public key infrastructure (PKI)
- Understand digital signatures and digital certificates
UNIT 11: Data Security
Outcomes: Upon completion of this unit, the students will be able to
- Understand data security and its importance
- Understand the different data security technologies
- Explain the various security controls for data encryption
- Use different disk encryption, file encryption, and removable-media encryption tools
- Explain methods and tools for data backup and retention
- Understand data loss prevention (DLP) and DLP solutions
UNIT 12: Network Traffic Monitoring
Outcomes: Upon completion of this unit, the students will be able to
- Understand the need for and advantages of network traffic monitoring
- Understand the network traffic signatures
- Describe the categories of suspicious traffic signatures
- Explain the attack signature analysis techniques
- Understand network monitoring for suspicious traffic
- Understand the various network monitoring tools
Projects Required:
Varies, refer to syllabus.
Textbook:
Contact Bookstore for current textbook.
Materials/Equipment Required:
None
Attendance Policy:
Students should adhere to the attendance policy outlined by the instructor in the course syllabus.
Grading Policy:
The grading policy will be outlined by the instructor in the course syllabus.
Maximum class size:
Based on classroom occupancy
Course Time Frame:
The U.S. Department of Education, Higher Learning Commission and the Kansas Board of Regents define credit hour and have specific regulations that the college must follow when developing, teaching and assessing the educational aspects of the college. A credit hour is an amount of work represented in intended learning outcomes and verified by evidence of student achievement that is an institutionally-established equivalency that reasonably approximates not less than one hour of classroom or direct faculty instruction and a minimum of two hours of out-of-class student work for approximately fifteen weeks for one semester hour of credit or an equivalent amount of work over a different amount of time. The number of semester hours of credit allowed for each distance education or blended hybrid courses shall be assigned by the college based on the amount of time needed to achieve the same course outcomes in a purely face-to-face format.
Refer to the following policies:
402.00 Academic Code of Conduct
263.00 Student Appeal of Course Grades
403.00 Student Code of Conduct
Disability Services Program:
Cowley College, in recognition of state and federal laws, will accommodate a student with a documented disability. If a student has a disability which may impact work in this class and which requires accommodations, contact the Disability Services Coordinator.
Created 3/30/2023
|