Course Number and Title: ISY 251 Hardening the Infrastructure
This course examines tools, techniques, and a technology used in the securing of information assets and is designed to provide in-depth information on the software and hardware components of information security and assurance. Topics covered include firewall configurations, network security, virtual private networks (VPNs), and security monitoring tools.
USB flash-drive for lab work and broadband Internet access
- Evaluate firewall planning and design. (CCC 1, 2, 3, 5; PGC 1, 2, 5, 7, 9)
- Create firewall configurations, and perform administration. (CCC 1, 2, 3; PGC 1, 2, 3,5)
- Explain and evaluate proxy servers. (CCC 1, 2, 3, 5; PGC 1, 3, 5, 7, 9)
- Analyze and implement encryption schemes. (CCC 1, 2, 3; PGC 1, 3, 5, 9)
- Evaluate and select an identity management structure. (CCC 1, 2, 3, 5; PGC 1, 2, 3, 4,5, 7, 9)
- Analyze and evaluate the setup of a Virtual Private Network (VPN). (CCC 1, 2, 3; PGC 2, 3, 5, 7, 9)
- Explain and configure intrusion detection and prevention systems. (CCC 1, 2, 3, 4; PGC 1, 2, 5)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Evaluate firewall planning and design.
- Identify common misconceptions about firewalls.
- Explain why a firewall is dependent on an effective security policy.
- Compare and contrast types of firewalls.
- Identify the limitations of firewalls.
- Evaluate and recommend suitable hardware and software for a firewall application.
- Create firewall configurations, and perform administration.
- Set up firewall rules that reflect security policies.
- Identify and implement different firewall configuration strategies.
- Modify existing firewall configurations to meet new needs and threats.
- Examine and analyze firewall log files, and follow the basic initial steps in responding to security incidents.
- Explain and evaluate proxy servers.
- Discuss proxy servers, and explain how they work.
- Evaluate the value of implementation of a proxy server.
- Discuss and recommend options for proxy server configuration.
- Explain how to deploy and use a reverse proxy server.
- 4. Analyze and implement encryption schemes.
- Describe the role encryption plays in firewall architecture.
- Explain how digital certificates work and why they are important security tools.
- Analyze the workings of secure socket layer (SSL), pretty good privacy (PGP), and other popular encryption schemes.
- Discuss and implement internet protocol security (IPSec).
- Evaluate and select an identity management structure.
- Describe the role identity management plays in network security.
- List the advantages and disadvantages of centralized authentication systems (CAS).
- Identify the weaknesses of password security systems.
- Employ password security tools.
- Summarize identity management.
- Analyze and evaluate the setup of a virtual private network (VPN).
- Explain the components and essential operations of VPNs.
- Describe the different types of VPNs.
- Choose the right tunneling protocol for a VPN.
- Enable secure remote access for individual users via a VPN.
- Recommend best practices for effective configuration and maintenance of VPNs.
- Explain and configure intrusion detection and prevention systems.
- Describe the various technologies used to implement intrusion detection and prevention.
- Configure intrusion detection system (IDS) and intrusion prevention system (IPS) rules.
- Discuss honey pots and honey nets systems.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Identify and remediate vulnerabilities.
- Design, plan, and install network systems.
- Install and configure operating systems.
- Demonstrate the ability to write and debug scripts.
- Demonstrate professionalism and ethical responsibility.
- Communicate effectively to diverse groups of stakeholders.
- Perform change management analysis and documentation.
- Perform evidence collection and forensics analysis.
- Create, modify, and/or implement security policies.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.