Download INFO 2225 - Metropolitan Community College

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Network tap wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Distributed firewall wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
METROPOLITAN COMMUNITY COLLEGE
COURSE OUTLINE
COURSE TITLE:
CCNA Security
COURSE PREFIX AND NO.
INFO 2225
LEC
4.5
LAB
0
CREDIT HOURS 4.5
COURSE DESCRIPTION:
This hands-on course provides an e-learning solution with an emphasis on practical experience to help
students develop specialized security skills to advance their careers. The curriculum helps prepare
students for the entry-level Cisco IOS Network Security (IINS) certification exam (640-553) leading to
the Cisco CCNA Security certification.
COURSE PREREQUISITE (S):
INFO 2220 or instructor permission or work experience
RATIONALE:
Security helps prepare the student for entry-level security career opportunities implementing Cisco IOS
Network Security (IINS) certification exam.
REQUIRED TEXTBOOK (S) and/or MATERIALS:
Title:
CCNA Security Lab Manual
Author:
Cisco
Publisher:
Cisco Press/Prentice Hall
Materials:
Attached course outline written by:
Steve Hall
Date: 12/10
Revised by:
INFO Faculty
Date: 10/14
Effective Date:
Academic Dean:
15/FA
Dr. Thos C. Pensabene
Metro Community College
Date:
Page 1 of 4
Revised: Oct-14
TITLE:
CCNA Security
PREFIX/NO.:
INFO 2225
COURSE OBJECTIVES:
Upon successful completion of this course, students will be able to:
1.
Discuss network threats, mitigation techniques, and the basics of securing a network.
2.
Explain secure administrative access on Cisco network devices.
3.
Explain secure network access with AAA.
4.
Describe firewall technologies to secure the network perimeter.
5.
Explain IPS to mitigate attacks on the network.
6.
Describe LAN security considerations and implement endpoint and Layer 2 security features.
7.
Explain methods for implementing data confidentiality and integrity.
8.
Describe the use of Virtual Private Networks.
9.
Create a comprehensive security policy.
10.
Configure and implement security measures for a given network topology.
TOPICAL UNIT OUTLINE/UNIT OBJECTIVES:
UNIT I:
A.
B.
UNIT II:
A.
B.
C.
D.
E.
F.
G.
UNIT III:
A.
B.
MODERN NETWORK SECURITY THREATS
Research Network Attacks
Research Security Audit Tools
SECURE NETWORK DEVICES
Secure the Router for Administrative Access
Control Administrative Access for Routers
Research Terminal Emulation Client Software and Configure the SSH Client
Secure Cisco IOS Image and Configure Files on R1 and R3’
Configure a Synchronized Time Source Using NTP
Configure Automated Security Features
Use the CCP Security Audit Tool on R1 to Identify Security Risk
AUTHENTICATE, AUTHORIZE, AND ACCOUNTING
Secure Administrative Access Using AAA and Radius
Configure the Basic Network Device
Metro Community College
Page 2 of 4
Revised: Oct-14
C.
D.
E.
UNIT IV:
A.
B.
UNIT V:
A.
UNIT VI:
A.
UNIT VII:
A.
UNIT VIII:
A.
UNIT IX:
A.
B.
C.
D.
E.
Configure Local Authentication
Configure Local Authentication Using AAA on R3
Configure Centralized Authentication Using AA and Radius
IMPLEMENT FIREWALL TECHNOLOGIES
Configure CBAC and Zone-Based Firewalls
Configure a Zone-Based Firewall (ZBF) Using CCP
IMPLEMENT INTRUSIONS DETECTION
Configure and Intrusion Prevention System (IPS) Using the CLI and CCP
SECURE THE LOCAL NETWORK
Secure Layer 2 Switches
1.
Configure basic switch settings
2.
Configure SSH access to the switches
3.
Secure trunks and access ports
4.
Configure SPAN and Monitor Traffic
CRYPTOGRAPHY
Explore Encryption Methods
1.
Build the network and configure the PCs
2.
Decipher a pre-encrypted message using the Vigenere Cipher
3.
Create a Vigenere Cipher encrypted message and decrypt it
4.
Use Steganography to embed a secret message in a graphic
IMPLEMENT VIRTUAL PRIVATE NETWORKS
Configure a Remote Access VPN Server and Client
1.
Configure basic router
2.
Configure a remote access VPN
PUTTING IT ALL TOGETHER
Create a Basic Technical Security Policy
Configure a Basic Network Device
Secure Network Routers
Secure Network Switches
Configure VPN Remote Access
COURSE REQUIREMENTS/EVALUATION:
Upon successful completion of the objectives for this course, the student will have acquired basic
cognitive knowledge of implementing CISCO’s IOS Network Security.
Metro Community College
Page 3 of 4
Revised: Oct-14
OUTCOME MEASURES
COURSE OBJECTIVES
ASSESSMENT
MEASURES
1.
Discuss network threats, mitigation techniques, and the basics of
securing a network.
Written exam with
minimum score of 73%
2.
Explain secure administrative access on Cisco network devices.
Written exam with
minimum score of 73%
3.
Explain secure network access with AAA.
Written exam with
minimum score of 73%
4.
Describe firewall technologies to secure the network perimeter.
Written exam with
minimum score of 73%
5.
Explain IPS to mitigate attacks on the network.
Written exam with
minimum score of 73%
6.
Describe LAN security considerations and implement endpoint
and Layer 2 security features.
Written exam with
minimum score of 73%
7.
Explain methods for implementing data confidentiality and
integrity.
Written exam with
minimum score of 73%
8.
Describe the use of Virtual Private Networks.
Written exam with
minimum score of 73%
9.
Create a comprehensive security policy.
Written exam with
minimum score of 73%
10. Configure and implement security measures for a given network
topology.
Metro Community College
Page 4 of 4
Written exam with
minimum score of 73%
Revised: Oct-14