none
This course prepares students to design and implement secure systems and networks. Topics include firewalls, Virtual Private Network (VPN), intrusion detection and prevention systems (IDS/IPS), and incident response. Students will simulate architectures of typical corporate network environments.
Obtain current textbook information by viewing the campus bookstore online or visit a campus bookstore. Check your course schedule for the course number and section.
Access to high-speed Internet.
none
- Explain the purpose and importance of hardening as it relates to confidentiality, integrity, and availability of information. (CCC1,2,4; PGC 1,3,4)
- Create firewall configurations and perform administration. (CCC 2; PGC 1,3)
- Explain and evaluate proxy servers. (CCC 1,2; PGC 1,3)
- Analyze and implement encryption schemes. (CCC 1,2; PGC 1,3)
- Evaluate and select an identity management structure. (CCC 1,2,3; PGC 1,3)
- Analyze and evaluate the setup of a Virtual Private Network (VPN). (CCC 1,2; PGC 1,3)
- Explain and configure intrusion detection and prevention systems (IDS/IPS). (CCC 1,2; PGC 1,3)
- Design a network architecture that supports the concept of defense in depth. (CCC 1,2,3; PGC 1,3)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Explain the purpose and importance of hardening as it relates to confidentiality, integrity, and availability of information.
- Define defense in depth.
- Explain the function of defense mechanisms.
- Identify methods used to harden networked systems.
- Create firewall configurations and perform administration.
- Identify common misconceptions about firewalls.
- Compare and contrast types of firewalls.
- Evaluate and recommend hardware and/or software for a firewall application.
- Identify and implement different firewall configuration strategies given specific security policy requirements.
- Modify existing firewall configurations to meet new needs and threats.
- Explain and evaluate proxy servers.
- Describe the purpose and function of proxy servers.
- Compare and contrast types of proxy servers.
- Evaluate and recommend options for proxy server configuration.
- Identify and implement different proxy servers given a specific scenario.
- Deploy a reverse proxy server.
- Analyze and implement encryption schemes.
- Explain the purpose and function of digital certificates.
- Describe secure socket layer (SSL), pretty good privacy (PGP), and other popular encryption schemes.
- Select and implement the appropriate encryption scheme to ensure confidentiality of data at rest.
- Evaluate and select an identity management structure.
- Explain the role of identity management in enterprise environments.
- Describe the methods of securing privileged access.
- Configure a centralized authentication solution in a networked environment.
- Select an identity management design given a scenario.
- Analyze and evaluate the setup of a Virtual Private Network (VPN).
- Describe the different types of VPNs.
- Explain the components and essential operations of VPNs.
- Select the appropriate tunneling protocol for a VPN.
- Enable secure remote access for individual users via a VPN.
- Explain and configure intrusion detection and prevention systems (IDS/IPS).
- Describe the various technologies used to implement intrusion detection and prevention.
- Configure intrusion detection system (IDS) and intrusion prevention system (IPS) rules.
- Explain the importance and function of honey pots and honey nets.
- Design a network architecture that supports the concept of defense in depth.
- Evaluate and select defensive mechanisms to meet requirements of a given scenario.
- Create a secure network design incorporating system and network defense strategies.
The grade will be determined using the Delaware Tech grading system:
90 | – | 100 | = | A |
---|---|---|---|---|
80 | – | 89 | = | B |
70 | – | 79 | = | C |
0 | – | 69 | = | F |
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Solve technology-related problems using critical thinking and troubleshooting skills.
- Articulate the role of the technology professional in organizations to support the ethical use of information technology.
- Apply fundamental security concepts and strategies for maintaining and securing information technology.
- Read and interpret technical information and effectively communicate to a wide range of audiences using oral, print, and multimedia strategies.
- Demonstrate the importance of lifelong learning that empowers personal and professional growth.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.