This page is old and out of date!Try this one from 2015 insteadCNIT 120: Network SecuritySpring 2012 Sam BowneScoresOpen Lab Hours for Sci 214Schedule · Lecture Notes · Projects · Links · Home Page |
33816 001 Lec T R 11:00-12:30PM SCIE 37 |
Catalog DescriptionKnowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).Advisorie: Students should have taken CNIT 106 or 106C or 201E, or equivalent familiarity with the fundamentals of networking. Upon successful completion of this course, the student will be able to:
Textbooks"Security+ Guide to Network Security Fundamentals", 4th Edition, by Mark Ciampa ISBN: 1111640122 Buy online"CNIT 120 Projects" by Sam Bowne (buy from CCSF bookstore) |
Schedule (may be revised) | ||||
---|---|---|---|---|
Tue 1-17 | Ch 1: Introduction to Security | |||
Thu 1-19 | Ch 1: Introduction to Security | |||
Tue 1-24 | Ch 2: Malware and Social Engineering Attacks | |||
Thu 1-26 | Ch 2: Malware and Social Engineering Attacks | |||
Tue 1-31 | Ch 2: Malware and Social Engineering Attacks | |||
Thu 2-2 | Ch 3: Application and Network Attacks | |||
Fri 2-3 | Last Day to Add | |||
Tue 2-7 | Proj 1-3 due | Ch 3: Application and Network Attacks | ||
Thu 2-9 | Quiz: Ch 1 & 2 | Ch 4: Vulnerability Assessment and Mitigating Attacks | ||
Tue 2-14 | Proj 4 due | Ch 4: Vulnerability Assessment and Mitigating Attacks | ||
Thu 2-16 | Quiz: Ch 3 | Ch 5: Host, Application, and Data Security | ||
Tue 2-21 | Proj 5 & 6 due | Ch 5: Host, Application, and Data Security | ||
Thu 2-23 | Quiz: Ch 4 | Ch 6: Network Security | ||
Tue 2-28 | Class Cancelled for B-Sides SF | |||
Thu 3-1 | Quiz: Ch 5 | Ch 6: Network Security | ||
Tue 3-6 | Proj 7 & 8 due | Ch 7: Administering a Secure Network | ||
Thu 3-8 | Quiz: Ch 6 | Ch 7: Administering a Secure Network | ||
Tue 3-13 | Proj 9 & 10 due | Ch 8: Wireless Network Security | ||
Thu 3-15 | Quiz: Ch 7 | Ch 8: Wireless Network Security | ||
Tue 3-20 | Class Cancelled | |||
Thu 3-22 | Proj 11 & 12 due Quiz: Ch 8 |
Ch 9: Access Control Fundamentals | ||
Tue 3-27 | Spring Recess: No Class | |||
Thu 3-29 | Spring Recess: No Class | |||
Tue 4-3 | Mid-term grades due | |||
Tue 4-3 | Proj 13 due | Ch 10: Authentication and Account Management | ||
Thu 4-5 | Quiz: Ch 9 | Ch 10: Authentication and Account Management | ||
Tue 4-10 | Proj 14 & 15 due | Ch 11: Basic Cryptography | ||
Thu 4-12 | Quiz: Ch 10 | Ch 11: Basic Cryptography | ||
Tue 4-17 | Visiting Speaker: Jeff Carrell on IPv6 | |||
Thu 4-19 | Ch 12: Advanced Cryptography | |||
Thu 4-19 | Last Day to Withdraw | |||
Tue 4-24 | Proj 16 due | Ch 12: Advanced Cryptography | ||
Thu 4-26 | Quiz: Ch 11 | Ch 13: Business Continuity | ||
Tue 5-1 | Proj 17 & 18 due | Ch 13: Business Continuity | ||
Thu 5-3 | Class Cancelled | |||
Tue 5-8 | Quiz: Ch 12 | Ch 14. Risk Mitigation | ||
Thu 5-10 | Quiz: Ch 13 | To Be Announced | ||
Tue 5-15 | To Be Announced | |||
Thu 5-17 | Quiz: Ch 14 Proj 19 due All Extra Credit Projects Due |
Last Class: Review | ||
Tue 5-22 | Final Exam: 10:30 am |
Lecture Notes | |
---|---|
Policy | |
Student Agreement | |
1. Introduction to Security Powerpoint | |
2: Malware and Social Engineering Attacks Powerpoint | |
OSI Model Review | |
3: Application and Network Attacks Powerpoint | |
4: Vulnerability Assessment and Mitigating Attacks Powerpoint | |
5: Host, Application, and Data Security Powerpoint | |
6: Network Security Powerpoint | |
7: Administering a Secure Network Powerpoint | |
8: Wireless Network Security Powerpoint | |
9: Access Control Fundamentals Powerpoint | |
10: Authentication and Account Management Powerpoint | |
11: Basic Cryptography Powerpoint | |
12: Advanced Cryptography Powerpoint | |
13: Business Continuity Powerpoint | |
14: Risk Mitigation Powerpoint | |
The lectures are in Word and PowerPoint formats. If you do not have Word or PowerPoint you will need to install the Free Word Viewer 2003 and/or the Free PowerPoint Viewer 2003. |
Note about 2015 page added 1-20-15