ISOL 532 – Telecommunications and Network Security

(0 review)
$300.00 $200.00
deskbg.jpg

Catalog Course Description

Various network security-related issues are introduced and examined. Different types of VPNs for securing data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to implement a VPN. Other topics include the utility of firewalls in tackling security problems and the limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a firewall and the functionality of a firewall.

Course Objectives

Course Competencies/ Learning Objectives

Course Learning Objectives Major Instructional Areas Assessment Method
Explain the fundamental concepts of network security. Network security risks, threats, and vulnerabilities Exams, DB Posts, Project
Describe the fundamental functions performed by firewalls. Firewall types, functions, uses, and deployment strategies Exams, DB Posts, Project
Describe the foundational concepts of VPNs. VPN types, functions, uses, and deployment strategies Exams, DB Posts, Project
Recognize the impact that malicious exploits and attacks have on network security. Exams, DB Posts, Project
Describe network security implementation strategies and the roles each can play within the security life cycle. Network-centric TCP/IP protocols and applications Exams, DB Posts, Project
Identify network security management best practices and strategies for responding when security measures fail. Layered network security strategies; secure network design; best practices and strategies for network security and incident response Exams, DB Posts, Project
Manage and monitor firewalls and understand their limitations. Exams, DB Posts, Project
Assess firewall design strategies and apply firewall management best practices. Exams, DB Posts, Project
Appraise firewall and other security options available for personal and small office/home office (SOHO) environments. Exams, DB Posts, Project
Appraise elements of VPN implementation and management. Exams, DB Posts, Project
Describe common VPN technologies. Exams, DB Posts, Project
Follow the creation of an example firewall implementation and an example VPN implementation. Exams, DB Posts, Project
Evaluate available resources and trends in network security. Exams, DB Posts, Project

Course Structure

  • Watch weekly lecture
  • Participate in class discussion via iLearn forums
  • Reading assigned texts
  • Complete quizzes based on assigned reading and lecture
  • Complete cases based upon a given scenario
  • Complete homework assignments from the text and other sources

 

Required Resources

Textbook(s) Required:

  • Stewart, James M. Network Security, Firewalls, and VPNs, 2nd ed. Burlington, MA: Jones & Bartlett, 2014

 

  • Virtual Security Cloud Labs*

 

  • Student Lab Manual (available within the virtual lab environment) *

 

 

* These resources are available if your educational institution purchased the Jones & Bartlett Learning lab manuals along with the courseware.

 

Recommended Materials/Resources

Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.

Books, Professional Journals

 

  • Seymour Bosworth, et al.

Computer Security Handbook, 5th ed. (Chapters 3, 21, and 26)

  • Douglas E Comer

Internetworking with TCP/IP, 5th ed.

 

  • Anne Henmi (ed).
    Firewall Policies and VPN Configurations (Chapters 2 and 5)

 

  • Jonathan Katz

Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC

 

  • Mark Lewis

Comparing, Designing, and Deploying VPNs

  • John Mairs

VPNs: A Beginner’s Guide

 

  • Noonan et al.

Firewall Fundamentals

 

  • Michael Rash
    Linux Firewalls: Attack Detection and Response With Iptables, Psad, and Fwsnort

 

  • Rhodes-Ousley et al.

Network Security: The Complete Reference

 

  • Debra L. Shinder, et al.
    Scene of the Cybercrime, 2nd

 

  • Thomas Shinder
    The Best Damn Firewall Book Period, 2nd

 

  • Richard Stevens et al.

TCP/IP Illustrated

 

  • James M. Stewart, et al.
    CISSP: Certified Information Systems Security Professional Study Guide, 5th

 

  • Keith Strassberg et al.

Firewalls: The Complete Reference

 

  • John R. Vacca, et al
    Firewalls: Jumpstart for Network and Systems Administrators

 

  • Michael E. Whitman et al.

Guide to Firewalls and Network Security

 

  • Ruixi Yuan

Virtual Private Networks: Technologies and Solutions

 

  • Elizabeth D. Zwicky et al.

Building Internet Firewalls, 2nd ed.

 

Other References

  • Common Vulnerabilities and Exposures (CVE)

http://cve.mitre.org

 

  • Information Assurance Support Environment (IASE): Security Technical Implementation Guides (STIGS)

http://iase.disa.mil/stigs/index.html

 

  • Chris May, et al.

Advanced Information Assurance Handbook

http://www.dtic.mil/dtic/tr/fulltext/u2/a443478.pdf

Professional Associations

 

  • CERT

This Web site provides assistance in understanding and handling security vulnerabilities. It also provides research tools on long-term changes in networked systems and gives training assistance to improve security.

http://www.cert.org/

 

  • International Association of Privacy Professionals (IAPP)

This Web site provides opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice.

https://www.privacyassociation.org/

 

  • International Information Systems Security Certification Consortium, Inc., (ISC)²®

This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools.

http://www.isc2.org/

 

  • ISACA

This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of like-minded colleagues and contains professional resources and technical/managerial publications.

https://www.isaca.org/Pages/default.aspx

 

  • National Institute of Standards and Technology (NIST)

This Web site provides access to subject matter experts and also facilitates in research. It also provides career-building resources and opportunities.

http://www.nist.gov/index.html

 

  • National Security Agency/Central Security Service (NSA/CSS)

This Web site provides guidance on information assurance security solutions and also provides insights on risks, vulnerabilities, mitigations, and threats. It also provides information on cryptologic support.
http://www.nsa.gov/index.shtml

 

  • SANS: Computer Security Training, Network Research & Resources

This Web site provides information on computer security training through several delivery methods like live and virtual conferences, mentors, online, and onsite. It also provides certification and numerous free security resources.
http://www.sans.org

Course Features

  • Lectures 0
  • Quizzes 0
  • Duration 50 hours
  • Skill level All levels
  • Language English
  • Students 0
  • Assessments Yes
Curriculum is empty
About Us: Our team is among the Top 1800 Freelancers on Freelancer.com. We have the best Learned Professional Academic Freelancers team dedicated to deliver the best. Our Services: Homework Help, Assignment Help, Engineering Projects Helps, Online Course Work Help, Term Paper Writing, Essay Writing, Research Paper Writing, Lab Reports, Project Management Assignment, or whatever you have for us. Just Contact us. Whatever is Your Subject? We have Solution for your Problem. All our works are strictly confidential and never disclosed. ---100% Free from Plagiarism on Turnitin, Write Check, ---24 x 7 Subject Help Freelancers Available ---On Time Completion Regards ---Full Grade (Professional Academic Freelancers) --- http://goo.gl/lw0vOr Google Us, Skype Us, Chat with Support

Reviews

Average Rating

0
0 rating

Detailed Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%
$300.00 $200.00