0% found this document useful (0 votes)
78 views6 pages

Btech It Security Fundamentals

fundamentals

Uploaded by

Raymond Fan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views6 pages

Btech It Security Fundamentals

fundamentals

Uploaded by

Raymond Fan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Higher Institute of Business Management and Republic of Cameroon

Technology (HIBMAT) Peace-Work-fatherland


BTECH
Course outline for IT Security Fundamentals
Course Instructor: Dr. Nde D Nguti
Tel: 67507 9262
email: dnguti@yahoo.co.uk
Lecture Schedule: Sarturday 07:00 – 09:00

Objectives
 Computer and Network Security Principles
 Network and Server Security
 Cryptography
 Authentication
 Authorization and Access Control
 Securing Network Transmission
 Remote Access and Wireless Security
 Server Roles and Security
 Protecting Against Malware
 Ongoing Security Management
 Fault Tolerance and Disaster Recovery
 Intrusion Detection and Response

Week Topic Detail


1 Computer and Network Security  Computer and Network Security Principles, intro-
Principles  duces basic terminology and concepts related to
security and gets
 the student thinking about why it is important to
take security mea-
 sures to protect a network and its resources. The
chapter begins with
 an overview of different types of attacks. Next it
discusses the three
 key aspects of security: confidentiality, integrity,
and authentication.
 From there it moves on to discuss risk analysis,
including identify-
 ing and ranking assets, threats, and vulnerabilities.
The chapter con-
 cludes with an overview of security policies and
standards.
Week Topic Detail
2 Network and Server Security  Network and Server Security, discusses some best
prac-
 tices and techniques for mitigating the risk to
servers on your net-
 work. It begins with a review of the Open Systems
Interconnection
 (OSI) model to ensure that students are familiar with
various proto-
 cols and the layers at which they operate. From
there it moves on to
 discuss some best practices when securing a
network: security by
 design and defense in depth. Next it presents some
techniques for
 reducing the attack surface of a server. The chapter
concludes with a
 look at perimeter security, including firewalls and
Network Address
 Translation (NAT).
3 Cryptography  Cryptography, introduces the fundamental principles
 of cryptography and discusses various ways it is
used to provide net-
 work and computer security. The chapter begins
with a brief history
 of cryptography and introduces the cast of
characters commonly used
 to describe cryptographic scenarios. Next it
discusses symmetric
 encryption and introduces the problem of how to
share symmetric
 keys. From there it moves on to discuss asymmetric
encryption and
 one of its common uses, digital signatures. Next it
looks at the role
 of hashes. The chapter then brings the cryptographic
techniques
 together to examine how they can be used to
provide confidentiality,
 integrity, and authentication. The chapter concludes
with an overview
 of public key infrastructure (PKI), using
Microsoft®’s Certificate Ser-
 vices as an example of how you can implement a
PKI.
Week Topic Detail
4 Authentication  Authentication, discusses the importance of
authenti-
 cation and how credentials can be used to prove the
identity of a user
 or computer. The student is first introduced to some
key authentica-
 tion and concepts, including the entities that must be
authenticated,
 single sign-on, and mutual authentication. Next the
chapter examines
 the types of credentials that can be used to prove the
identity of a
 user or computer. The chapter then looks at some
protocols used for
 network authentication. The chapter concludes with
a look at best
 practices, including using strong passwords and
limiting the times
 during which or locations from which a user can log
on
5 Authorization and Access Control  Authorization and Access Control, introduces
students
 to concepts and procedures related to limiting who
can access
 resources on a network. The chapter begins by
discussing types of
 access control that have been used historically and
that are used today,
 including mandatory access control (MAC),
discretionary access con-
 trol (DAC), and role-based access control (RBAC).
Next it examines
 how access control is managed on a Windows®
network. The chapter
 concludes with a look at access control in a Unix®
or Linux envi-
 ronment.
Week Topic Detail
6 Securing Network Transmission  Securing Network Transmission, focuses on
securing net-
 work perimeters and data in transit on the network.
The chapter begins
 with a look at some attacks that target network
services and packets on
 the network. Next it examines some strategies for
segmenting a network
 and securing network perimeters. It concludes with
a look at some pro-
 tocols that can be used to encrypt data on the
network, including Secure
 Sockets Layer (SSL), Transport Layer Security
(TLS), and IP security
 (IPsec).
7 Remote Access and Wireless Security  Remote Access and Wireless Security, deals with
 security considerations for a network that extends
past the tradi-
 tional WAN. It begins with a discussion of the
dangers of modems
 and how to secure a network that allows dial-in
access. Next it
 looks at virtual private networks (VPNs). From
there it moves on
 to discuss how Remote Authentication Dial-in User
Service
 (RADIUS) or Terminal Access Controller Access
Control System
 (TACACS) can be used to centralize authentication
for remote
 access clients. The chapter concludes by examining
the threats
 introduced through wireless networking and steps
you can take to
 mitigate those threats.
Week Topic Detail
8 Server Roles and Security  Server Roles and Security, examines the different
roles
 servers play on a network and discusses ways to
mitigate the threats
 associated with specific server roles. The chapter
begins by dis-
 cussing establishing a security baseline for the
servers on a network.
 Next it examines risks specific to infrastructure
servers, including
 domain name system (DNS), Dynamic Host
Configuration Protocol
 (DHCP), and Windows Internet Name Service
(WINS) servers, and
 how to mitigate them. It then discusses steps to take
to secure
 domain controllers. Next it looks at considerations
for securing file
 and print servers. The chapter concludes with a look
at security
 issues specific to application servers, such as web
and database
 servers.
9 Protecting Against Malware  Protecting Against Malware, looks at various types
of
 malware and steps to take to protect computers
against viruses,
 worms, spyware, and other types of malicious code.
The chapter
 begins by defining the types of malware that
typically pose a threat
 to computers. Next it discusses anti-malware
programs and the
 importance of user education in preventing attacks.
The chapter then
 discusses issues related to securely browsing web
sites. The chapter
 concludes with a look at risks specific to email and
how to mitigate
 them.
Week Topic Detail
10 Ongoing Security Management  Ongoing Security Management, examines some key
 considerations for keeping a network secure. It
begins with a discussion of strategies for ensuring
that operating systems and applications are
 kept up-to-date with the latest security patches.
Next, it discusses the
 importance of auditing and ongoing monitoring.
Finally, the chapter
 examines strategies for both in-band and out-of-
band remote man-
 agement.
11 Fault Tolerance and Disaster  Disaster Recovery and Fault Tolerance, examines
Recovery the
 importance of planning for the worst. It begins by
discussing three
 types of plans a company should have in place to
define recovery pro-
 cedures when a disaster or attack occurs. Next, it
covers the impor-
 tance of backups. The chapter concludes with a look
at fault tolerance
 technologies, include Redundant Array of
Independent Disks (RAID)
 and failover configurations.
12 Intrusion Detection and Response  Intrusion Detection and Forensics, introduces stu-
 dents to techniques used to detect a potential attack
and analyze the
 nature of an attack. The chapter begins with a look
at intrusion
 detection systems (IDS) and how they can be used
to provide
 advance warning of an impending attack. Next, it
looks at how hon-
 eypots can be used to analyze an attacker’s methods.
The chapter
 concludes with a look at forensics, including
procedures for pre-
 serving evidence and investigating the extent and
methods used in
 an attack.

Books: Network Security Fundamentals by:


Eric Cole, Ronald L. Krutz, James W. Conley, Brian Reisman, Mitch Ruebush, and Dieter Gollmann
Soft copy available

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy