* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download INFO 2225 - Metropolitan Community College
Zero-configuration networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Airborne Networking wikipedia , lookup
Network tap wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
METROPOLITAN COMMUNITY COLLEGE COURSE OUTLINE COURSE TITLE: CCNA Security COURSE PREFIX AND NO. INFO 2225 LEC 4.5 LAB 0 CREDIT HOURS 4.5 COURSE DESCRIPTION: This hands-on course provides an e-learning solution with an emphasis on practical experience to help students develop specialized security skills to advance their careers. The curriculum helps prepare students for the entry-level Cisco IOS Network Security (IINS) certification exam (640-553) leading to the Cisco CCNA Security certification. COURSE PREREQUISITE (S): INFO 2220 or instructor permission or work experience RATIONALE: Security helps prepare the student for entry-level security career opportunities implementing Cisco IOS Network Security (IINS) certification exam. REQUIRED TEXTBOOK (S) and/or MATERIALS: Title: CCNA Security Lab Manual Author: Cisco Publisher: Cisco Press/Prentice Hall Materials: Attached course outline written by: Steve Hall Date: 12/10 Revised by: INFO Faculty Date: 10/14 Effective Date: Academic Dean: 15/FA Dr. Thos C. Pensabene Metro Community College Date: Page 1 of 4 Revised: Oct-14 TITLE: CCNA Security PREFIX/NO.: INFO 2225 COURSE OBJECTIVES: Upon successful completion of this course, students will be able to: 1. Discuss network threats, mitigation techniques, and the basics of securing a network. 2. Explain secure administrative access on Cisco network devices. 3. Explain secure network access with AAA. 4. Describe firewall technologies to secure the network perimeter. 5. Explain IPS to mitigate attacks on the network. 6. Describe LAN security considerations and implement endpoint and Layer 2 security features. 7. Explain methods for implementing data confidentiality and integrity. 8. Describe the use of Virtual Private Networks. 9. Create a comprehensive security policy. 10. Configure and implement security measures for a given network topology. TOPICAL UNIT OUTLINE/UNIT OBJECTIVES: UNIT I: A. B. UNIT II: A. B. C. D. E. F. G. UNIT III: A. B. MODERN NETWORK SECURITY THREATS Research Network Attacks Research Security Audit Tools SECURE NETWORK DEVICES Secure the Router for Administrative Access Control Administrative Access for Routers Research Terminal Emulation Client Software and Configure the SSH Client Secure Cisco IOS Image and Configure Files on R1 and R3’ Configure a Synchronized Time Source Using NTP Configure Automated Security Features Use the CCP Security Audit Tool on R1 to Identify Security Risk AUTHENTICATE, AUTHORIZE, AND ACCOUNTING Secure Administrative Access Using AAA and Radius Configure the Basic Network Device Metro Community College Page 2 of 4 Revised: Oct-14 C. D. E. UNIT IV: A. B. UNIT V: A. UNIT VI: A. UNIT VII: A. UNIT VIII: A. UNIT IX: A. B. C. D. E. Configure Local Authentication Configure Local Authentication Using AAA on R3 Configure Centralized Authentication Using AA and Radius IMPLEMENT FIREWALL TECHNOLOGIES Configure CBAC and Zone-Based Firewalls Configure a Zone-Based Firewall (ZBF) Using CCP IMPLEMENT INTRUSIONS DETECTION Configure and Intrusion Prevention System (IPS) Using the CLI and CCP SECURE THE LOCAL NETWORK Secure Layer 2 Switches 1. Configure basic switch settings 2. Configure SSH access to the switches 3. Secure trunks and access ports 4. Configure SPAN and Monitor Traffic CRYPTOGRAPHY Explore Encryption Methods 1. Build the network and configure the PCs 2. Decipher a pre-encrypted message using the Vigenere Cipher 3. Create a Vigenere Cipher encrypted message and decrypt it 4. Use Steganography to embed a secret message in a graphic IMPLEMENT VIRTUAL PRIVATE NETWORKS Configure a Remote Access VPN Server and Client 1. Configure basic router 2. Configure a remote access VPN PUTTING IT ALL TOGETHER Create a Basic Technical Security Policy Configure a Basic Network Device Secure Network Routers Secure Network Switches Configure VPN Remote Access COURSE REQUIREMENTS/EVALUATION: Upon successful completion of the objectives for this course, the student will have acquired basic cognitive knowledge of implementing CISCO’s IOS Network Security. Metro Community College Page 3 of 4 Revised: Oct-14 OUTCOME MEASURES COURSE OBJECTIVES ASSESSMENT MEASURES 1. Discuss network threats, mitigation techniques, and the basics of securing a network. Written exam with minimum score of 73% 2. Explain secure administrative access on Cisco network devices. Written exam with minimum score of 73% 3. Explain secure network access with AAA. Written exam with minimum score of 73% 4. Describe firewall technologies to secure the network perimeter. Written exam with minimum score of 73% 5. Explain IPS to mitigate attacks on the network. Written exam with minimum score of 73% 6. Describe LAN security considerations and implement endpoint and Layer 2 security features. Written exam with minimum score of 73% 7. Explain methods for implementing data confidentiality and integrity. Written exam with minimum score of 73% 8. Describe the use of Virtual Private Networks. Written exam with minimum score of 73% 9. Create a comprehensive security policy. Written exam with minimum score of 73% 10. Configure and implement security measures for a given network topology. Metro Community College Page 4 of 4 Written exam with minimum score of 73% Revised: Oct-14