CCCOnline LogoCourse Snapshot for CNG132 - Network Security Fundamentals

The information listed below is subject to change. Please review the course syllabus within your online course at the start of class.

Course Competencies

The competencies you will demonstrate in this course are as follows:

  1. Define information security and explain the significance of securing information.
  2. List the basic steps of an attack and the five steps in a defense.
  3. Access controls using OSI Layer 2 protocols.
  4. Practice examples of information security issues and tools implemented in today’s businesses.
  5. Recognize authentication methods, such as Kerberos, CHAP, certificates, username/password strategies, tokens, and biometrics.
  6. Identify systems attacks, malicious code, social engineering, auditing/logging, and system scanning.
  7. Design a communication security strategy, including remote access, e-mail, file transfer, wireless, and the Web.
  8. Design an infrastructure security strategy, including devices, media, security topologies, and intrusion detection.
  9. Describe the basics of cryptography.
  10. Plan for redundancy and develop disaster recovery procedures.
  11. Control risk through security policies, awareness, and training.

Module Outcomes Mapped to Competencies

Module 1
  Outcomes Competencies
1 Identify basic principles of IT security, such as CIA and AAA, basic threats, and ways to mitigate those threats. A
2 Describe the various hats worn in the hacker society. A
3 Describe the other types of attackers. A
4 Identify computer security threats. A
5 Describe how malware finds its way to computer systems. A
6 Identify how to defend against malware threats in a proactive way. A, D
7 Identify, install, and configure security applications such as personal firewalls, antivirus programs, and host-based intrusion detection systems. A, D
8 Describe how to protect a computer’s hardware, UEFI/BIOS, wireless devices, and peripherals such as USB devices. A, D, H
9 Describe how to protect mobile devices and the data they contain by using screen locks, encryption, remote wipe utilities, and good BYOD policies. A, D, H
10 Identify and install patches and hotfixes. A, D
11 Identify the various virtualization technologies. A, D
12 Identify how to secure the web browser. A, D, H
13 Identify how to secure common applications such as Microsoft Office and demonstrate how to make those applications safe. A, D, H
14 Identify the basic concepts of programming security including system testing, secure code review, and fuzzing. A, D, H
Module 2
  Outcomes Competencies
1 Describe network design elements. B
2 Describe how the security administrator must strike a balance of security and data availability. H
3 Identify and secure ports and their associated protocols. B
4 Describe network attacks and explain how to defend against them. B
5 Identify network security concepts. B
6 Identify the characteristics, advantages, disadvantages, and differences of network intrusion detection systems and network intrusion prevention systems. H
7 Identify how to reduce the risk of attack to wired networks and the central connecting devices that control access to those networks. H
8 Secure wireless networks, including wireless access points and wireless network adapters. D
Module 3
  Outcomes Competencies
1 Identify methods to ensure proper authentication when a person enters a building. D
2 Identify local authentication technologies. E
3 Identify and implement access control models. D, E
4 Identify and implement users, groups, permissions, rights, and policies that can be created on a computer network. D
5 Describe qualitative and quantitative risk and describe the methodologies of an important part of risk management. D
6 Apply common network security tools to measure the vulnerability of computer systems and network devices. D
Module 4
  Outcomes Competencies
1 Identify and implement monitoring of the network. D, F
2 Implement performance analysis tools. D, F, G
3 Describe how to execute an audit and how to use some of the tools in a Windows server to perform audits and log them properly. F, G, H
4 Identify understand the basic terminology of cryptography. H, I
5 Identify the various symmetric algorithms. H, D
6 Describe the most common way to verify the integrity of files: hashing. D
7 Identify PKI and its components. D
8 Describe security protocols. D
Module 5
  Outcomes Competencies
1 Identify how to ensure that the network and servers are fault tolerant. Topics covered include redundant power, data, servers, and ISPs. J
2 Describe how to back up data and develop a proper disaster recovery plan. H, J
3 Describe the methods and techniques that social engineers can employ to gain access to buildings and systems. F
4 Describe how to train users on the basics of security. G, F
5 Describe fire suppression methods as well as HVAC, shielding, and the Faraday cage concept. J, K
6 Identify ways to classify data, laws that protect individual privacy, personnel security policies and how to implement them, service-level agreements, and the safe disposal of computers. K
7 Describe the processes and procedures involved in computer security incident management. Proper planning for incident response is key, as is the ability to document the lessons learned. G, K
8 Describe the basics of security frameworks and how they can help to organize IT processes and procedures. G, K

Course Time Commitment and Expectations

The semester schedule for this course may be 15 weeks or 10 weeks in duration. Based on the course format, this table shows the approximate amount of time you should plan to spend per week on this course. This includes time to read/listen to the online content, participate in discussion forums, complete all assignments, and study the course material.

For accelerated courses, the amount of time required per week is greater. Note that regardless of course format, the course material is the same and all course competencies, module outcomes, and assignments will be covered.

Course Activity Hours and Student Learning Hours
Course Credit Hours Course Format (Duration) Pace Relative to a 15 Week Course Course Activity Hours Student Learning Hours Per Week
4 15 Weeks - 180 11.5 to 12.5
4 10 Weeks 1.5x faster 180 17 to 19

Aside from typical reading assignments, this course has the following (Please Note: This list is subject to change based on the discretion of the instructor facilitating this course.):


Summary of Grading
Assignment Points %
Discussions (10 @ 10 points each) 100 10%
Quizzes (18 @ 20 points each) 360 36%
Performance Labs (15 @ 30 points each) 450 45%
Practice Certification 90 9%
TOTAL 1000 100%

 

CCCOnline Course Quality Commitment

CCCOnline goes to great lengths to assure the quality of your online learning experience. You can expect the following from our courses: