PCC/ CCOG / CIS

Course Content and Outcome Guide for CIS 285

Course Number:
CIS 285
Course Title:
Security Tools
Credit Hours:
4
Lecture Hours:
40
Lecture/Lab Hours:
0
Lab Hours:
0
Special Fee:
 

Course Description

Prepares network administrators to apply information security concepts and Open Source applications to manage security in Windows and Linux/Unix information systems. Topics include analysis and management tools, firewalls and packet filters, port and vulnerability scanners, sniffers, intrusion detection, encryption, wireless and forensics. Recommended: CIS 284 Audit available.

Intended Outcomes for the course

On successful completion of this course the student should be able to:
Ï     Select and
Ï     Apply security applications

Course Activities and Design

This course is presented by means of:
Ï       on-campus lectures or on-line lessons
Ï       group discussions
Ï       individual lab assignments
Ï       group lab assignments.
Students will be required to use essential tools to complete the lab assignments.

Outcome Assessment Strategies

Through exams and lab assignments students will be assessed to determine whether they are able to:
Ï       Explain and apply operating system hardening techniques.
Ï       Differentiate and explain common secure network architectures.
Ï       Explain and apply packet filtering.
Ï       Install, configure and administer stateful firewalls.
Ï       Create VPNs through firewalls.
Ï       Explain the concepts, features and uses of port scanners.
Ï       Install, configure and apply port scanners and related add-ons.
Ï       Identify, explain and classify types of security vulnerabilities.
Ï       Differentiate and explain vulnerability scanners.
Ï       Install, configure and administer vulnerability scanners.
Ï       Explain TCP/IP header fields and their values.
Ï       Explain the concepts, features and uses of protocol analyzers.
Ï       Install, configure and apply protocol analyzers.
Ï       Differentiate and explain the use of host intrusion detection systems.
Ï       Differentiate and explain the use of network intrusion detection systems.
Ï       Install, configure and apply host intrusion detection systems.
Ï       Install, configure and apply network intrusion detection systems.
Ï       Differentiate and explain common analysis and management tools.
Ï       Install, configure and apply common analysis and management tools.
Ï       Differentiate and explain common encryption and VPN tools.
Ï       Install, configure and apply common encryption and VPN tools.
Ï       Explain the security risks of wireless LANs
Ï       Perform a wireless security assessment.
Ï       Differentiate and explain common incident response practices.
Ï       Install, configure and apply common forensic analysis tools.
Ï       Explain the concepts and practices of managing forensic evidence.

Course Content (Themes, Concepts, Issues and Skills)

(Themes, Concepts, Issues, Competencies and Skills)
Ï       Security practices.
Ï       Legal and ethical considerations of information systems security.
Ï       Security policy.
Ï       Security topologies.
Ï       Hardening tools and techniques.
Ï       Security tools including,
u     Firewalls,
u     VPNs,
u     port scanners,
u     vulnerability scanners,
u     sniffers,
u     network intrusion detection systems,
u     host intrusion detection systems,
u     log monitor and notification applications,
u     analysis and management tools,
u     encryption applications,
u     key management,
u     secure shell and file transfer applications,
u     password crackers,
u     wireless security assessment tools and
u     forensic tools