ISOL 532 – Telecommunications and Network Security
Catalog Course Description
Various network security-related issues are introduced and examined. Different types of VPNs for securing data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to implement a VPN. Other topics include the utility of firewalls in tackling security problems and the limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a firewall and the functionality of a firewall.
Course Competencies/ Learning Objectives
|Course Learning Objectives||Major Instructional Areas||Assessment Method|
|Explain the fundamental concepts of network security.||Network security risks, threats, and vulnerabilities||Exams, DB Posts, Project|
|Describe the fundamental functions performed by firewalls.||Firewall types, functions, uses, and deployment strategies||Exams, DB Posts, Project|
|Describe the foundational concepts of VPNs.||VPN types, functions, uses, and deployment strategies||Exams, DB Posts, Project|
|Recognize the impact that malicious exploits and attacks have on network security.||Exams, DB Posts, Project|
|Describe network security implementation strategies and the roles each can play within the security life cycle.||Network-centric TCP/IP protocols and applications||Exams, DB Posts, Project|
|Identify network security management best practices and strategies for responding when security measures fail.||Layered network security strategies; secure network design; best practices and strategies for network security and incident response||Exams, DB Posts, Project|
|Manage and monitor firewalls and understand their limitations.||Exams, DB Posts, Project|
|Assess firewall design strategies and apply firewall management best practices.||Exams, DB Posts, Project|
|Appraise firewall and other security options available for personal and small office/home office (SOHO) environments.||Exams, DB Posts, Project|
|Appraise elements of VPN implementation and management.||Exams, DB Posts, Project|
|Describe common VPN technologies.||Exams, DB Posts, Project|
|Follow the creation of an example firewall implementation and an example VPN implementation.||Exams, DB Posts, Project|
|Evaluate available resources and trends in network security.||Exams, DB Posts, Project|
- Watch weekly lecture
- Participate in class discussion via iLearn forums
- Reading assigned texts
- Complete quizzes based on assigned reading and lecture
- Complete cases based upon a given scenario
- Complete homework assignments from the text and other sources
- Stewart, James M. Network Security, Firewalls, and VPNs, 2nd ed. Burlington, MA: Jones & Bartlett, 2014
- Virtual Security Cloud Labs*
- Student Lab Manual (available within the virtual lab environment) *
* These resources are available if your educational institution purchased the Jones & Bartlett Learning lab manuals along with the courseware.
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
Books, Professional Journals
- Seymour Bosworth, et al.
Computer Security Handbook, 5th ed. (Chapters 3, 21, and 26)
- Douglas E Comer
Internetworking with TCP/IP, 5th ed.
- Anne Henmi (ed).
Firewall Policies and VPN Configurations (Chapters 2 and 5)
- Jonathan Katz
Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC
- Mark Lewis
Comparing, Designing, and Deploying VPNs
- John Mairs
VPNs: A Beginner’s Guide
- Noonan et al.
- Michael Rash
Linux Firewalls: Attack Detection and Response With Iptables, Psad, and Fwsnort
- Rhodes-Ousley et al.
Network Security: The Complete Reference
- Debra L. Shinder, et al.
Scene of the Cybercrime, 2nd
- Thomas Shinder
The Best Damn Firewall Book Period, 2nd
- Richard Stevens et al.
- James M. Stewart, et al.
CISSP: Certified Information Systems Security Professional Study Guide, 5th
- Keith Strassberg et al.
Firewalls: The Complete Reference
- John R. Vacca, et al
Firewalls: Jumpstart for Network and Systems Administrators
- Michael E. Whitman et al.
Guide to Firewalls and Network Security
- Ruixi Yuan
Virtual Private Networks: Technologies and Solutions
- Elizabeth D. Zwicky et al.
Building Internet Firewalls, 2nd ed.
- Common Vulnerabilities and Exposures (CVE)
- Information Assurance Support Environment (IASE): Security Technical Implementation Guides (STIGS)
- Chris May, et al.
Advanced Information Assurance Handbook
This Web site provides assistance in understanding and handling security vulnerabilities. It also provides research tools on long-term changes in networked systems and gives training assistance to improve security.
- International Association of Privacy Professionals (IAPP)
This Web site provides opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice.
- International Information Systems Security Certification Consortium, Inc., (ISC)²®
This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools.
This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of like-minded colleagues and contains professional resources and technical/managerial publications.
- National Institute of Standards and Technology (NIST)
This Web site provides access to subject matter experts and also facilitates in research. It also provides career-building resources and opportunities.
- National Security Agency/Central Security Service (NSA/CSS)
This Web site provides guidance on information assurance security solutions and also provides insights on risks, vulnerabilities, mitigations, and threats. It also provides information on cryptologic support.
- SANS: Computer Security Training, Network Research & Resources
This Web site provides information on computer security training through several delivery methods like live and virtual conferences, mentors, online, and onsite. It also provides certification and numerous free security resources.
- Lectures 0
- Quizzes 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 0
- Assessments Yes