CNIT 120: Network SecuritySpring 2016 Sam BowneScoresOpen Lab Hours for Sci 214Schedule · Slides · Projects · Links · Home Page |
36679 001 Lec T R 11:10-12:25 PM SCIE 37 |
Catalog DescriptionKnowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).Advisories: Students should have taken CNIT 106 or 106C or 201E, or equivalent familiarity with the fundamentals of networking. Upon successful completion of this course, the student will be able to:
Student Learning Outcomes (measured to guide course improvements)1. Define areas of security concern, discuss network security, and identify security risks2. Evaluate various anti-virus software programs, and compare to software and hardware firewalls 3. Discuss weaknesses of various operating systems and known and recommended fixes (patches) Textbook"CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide", by Darril Gibson ASIN: B00NNWKN3G; ISBN-10: 1939136024Buy online ($32 paperback, $10 on Kindle) |
Schedule | |||
---|---|---|---|
Tue 1-19 | Intro: CCSF's "Virus" Scandal | ||
Thu 1-21 | Ch 1. Mastering Security Basics | ||
Tue 1-26 | Ch 1. Mastering Security Basics | ||
Thu 1-28 | Ch 1. Mastering Security Basics | ||
Tue 2-2 | Ch 2. Exploring Control Types and Methods | ||
Thu 2-4 | Ch 2. Exploring Control Types and Methods | ||
Fri 2-5 | Last Day to Add | ||
Tue 2-9 | Proj 1 & 2 due | Ch 3. Understanding Basic Network Security | |
Thu 2-11 | Quiz: Ch 1 & 2 | Ch 3. Understanding Basic Network Security | |
Tue 2-16 | Proj 3 & 4 due | Ch 3. Understanding Basic Network Security | |
Thu 2-18 | Ch 4. Securing Your Network | ||
Tue 2-23 | Proj 5 due | Ch 4. Securing Your Network | |
Thu 2-25 | Quiz: Ch 3 | Ch 5. Securing Hosts and Data | |
Tue 3-1 | Proj 6 & 7 due | Ch 5. Securing Hosts and Data | |
Thu 3-3 | Quiz: Ch 4 | Ch 5. Securing Hosts and Data | |
Tue 3-8 | Flex Day--No Class Faculty are required to endure a day of outrageous lies about politics & statistics | ||
Thu 3-10 | Ch 6. Understanding Malware and Social Engineering | ||
Tue 3-15 | Proj 8 & 9 due | Ch 6. Understanding Malware and Social Engineering | |
Thu 3-17 | Quiz: Ch 5 | Ch 7. Identifying Advanced Attacks | |
Tue 3-22 | Proj 10 due | Ch 7. Identifying Advanced Attacks | |
Thu 3-24 | Quiz: Ch 6 |
Ch 8. Managing Risk | |
Tue 3-29 | Holiday--No Class | ||
Thu 3-31 | Holiday--No Class | ||
Tue 4-5 | Proj 13 due | Ch 8. Managing Risk | |
Wed 4-6 | Mid-term grades due | ||
Thu 4-7 | Quiz: Ch 7 | Ch 8. Managing Risk | |
Tue 4-12 | Proj 12 due | Ch 9. Preparing for Business Continuity | |
Thu 4-14 | Quiz: Ch 8 | Ch 9. Preparing for Business Continuity | |
Thu 4-14 | Last Day to Withdraw | ||
Tue 4-19 | Proj 11 & 14 due | To Be Announced | |
Thu 4-21 | Quiz: Ch 9 | Ch 10. Understanding Cryptography | |
Tue 4-26 | Proj 15 & 16 due | Ch 10. Understanding Cryptography | |
Thu 4-28 | Ch 10. Understanding Cryptography | ||
Tue 5-3 | Proj 17 due | Ch 10. Understanding Cryptography | |
Thu 5-5 | Class Cancelled | ||
Tue 5-10 | Proj 18 & 19 due | Ch 11. Exploring Operational Security | |
Thu 5-12 | Quiz: Ch 10 | Ch 11. Exploring Operational Security | |
Tue 5-17 | All Extra Credit Proj due | Last Class: Security+ Review Questions | |
Tue 5-24 | Final Exam: 10:30 am |
Slides | |
---|---|
Policy Student Agreement (PDF) | |
Hacking Real Servers
| |
1. Mastering Security Basics | |
2. Exploring Control Types and Methods | |
3. Understanding Basic Network Security | |
4. Securing Your Network | |
5. Securing Hosts and Data | |
6. Understanding Malware and Social Engineering | |
7. Identifying Advanced Attacks | |
8. Managing Risk | |
9. Preparing for Business Continuity | |
10. Understanding Cryptography | |
11. Exploring Operational Security | |
The lectures linked above are in PowerPoint format. If you do not have PowerPoint you can use Open Office, or get them in HTML form from Github (ty sonokamome). |