Fundamentals of Computer Security

Time Wednesdays 5:30pm to 8:35pm
Room 828 Aptos Main Campus
Live Online
Roll Call
Units 3
Transfers CSU
Prerequisites CIS 172 and CIS 81 or equivalent knowledge
Book Principles of Information Security (5th Edition)
ISBN 978-1-2854-4836-7
Links Netlab Server
Canvas

Course Calendar

Week Topic Reading Lab Project
1 Introduction to CIS-75
Recording
2 Security Fundamentals - Part 1
Recording Part 1 Part 2
Chapter 1 Lab 0
3 Security Fundamentals - Part 2
Recording
Chapter 1 Lab 1 Capturing Network Traffic
4 Threats, Attacks and Hackers
Recording
Pages 45 - 70
5 Attacks and Failures Pages 71 - 101 Lab 2 Extracting Data with Wireshark Project 1
6 Risk Management Pages 229 - 267
7 Midterm Review Chapter 4
8 Midterm
9 Access Control Pages 297- 315
10 Firewalls Pages 315 - 353
11 Intrusion Detection and Prevention Pages 355 - 391
12 Port Scanning and Network Mapping Pages 395 - 413
13 Cryptography Pages 417 - 442
14 Public Key Infrastructure Pages 442 - 464
15 Wrap Up Chapter 9
16 Final

Course Description

Introduces the threats and vulnerabilities of computer systems, and helps prepare for security-related industry certifications such as CompTIA Security+. Topics will include intrusion detection, intrusion prevention, encryption, VPNs, authentication, and implementing security procedures. Treats security not simply as a product to be installed, but as a way of thinking about all aspects of an organization's security needs.

Student Learner Outcomes

  1. Explain and implement security concepts and security policies
  2. Explain and implement network monitoring, intrusion detection, auditing and packet capture
  3. Analyze common threats to and vulnerabilities of computer systems and networks

Objectives

  1. Explain security concepts and security policies.
  2. Explain network device functions and TCP/IP operation.
  3. Implement network scanning, enumeration and fingerprinting.
  4. Explain and implement network monitoring, intrusion detection, auditing and packet capture.
  5. Explain and implement host hardening and host defense.
  6. Explain wireless network operation and security.
  7. Explain and configure perimeter and host firewalls.
  8. Explain cryptography; VPNs, and IPSec.
  9. Explain network access control, RADIUS, and Digital Certificates.

Grading Policy

  1. 60% Labs
  2. 20% Midterm
  3. 20% Final