Network Security I M.C. Juan Carlos Olivares Rojas Course Syllabus January, 2009.

Slides:



Advertisements
Similar presentations
Computer Network Management
Advertisements

Operating Systems M.C. Juan Carlos Olivares Rojas Course Syllabus January, 2009.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Roger Beresford WUCM1 – Webserver Use, Configuration & Management Introduction and overview 1 Jim Briggs.
CS 447 Distributed Objects Instructor: Shangping Ren.
1 Sonia FahmyPurdue University Firewalls and Firewall Testing Techniques Sonia Fahmy Department of Computer Sciences Purdue University
1 SWE Introduction to Software Engineering Fall Semester (081) King Fahd University of Petroleum & Minerals Information & Computer Science.
Informatic Audit Report M.C. Juan Carlos Olivares Rojas Department of Computer and System Instituto Tecnológico de Morelia
Spring 2010, ICE Stephen Kim, Ph.D.. March 3 rd – June 11 th, 2010 Wednesday and Friday 1:30-2:45 pm Room
Network Problems and Solutions M. Sc. Juan Carlos Olivares Rojas
Network Management M. Sc. Juan Carlos Olivares Rojas
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Lecture 0 Digital Electronics Fundamentals Computer Architecture and System Software There are 10 kinds of people in this world – those who understand.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Computer Networking Course Introduction Dr Sandra I. Woolley.
Course 6420A Fundamentals of Windows Server® 2008 Network and Applications Infrastructure.
Designing Security for Microsoft® Networks Course 2830B.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Course Introduction Software Engineering
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Internet and Intranet Fundamentals Class 9 Session A.
Securing Wired Local Area Networks(LANs)
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Computer Network Management Course
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
Informatic Aduting K1 Classroom, Monday to Friday at 10:00 Instructor: M.C. Juan Carlos Olivares Rojas
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
ICS202 Data Structures King Fahd University of Petroleum & Minerals College of Computer Science & Engineering Information & Computer Science Department.
Module 11: Designing Security for Network Perimeters.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Introduction to Operating Systems CCSA 125 L.Deema ALShoaibi.
Artificial Intelligence M.C. Juan Carlos Olivares Rojas Course Syllabus January, 2009.
Structured Design of Algoritms M.C. Juan Carlos Olivares Rojas Course Syllabus January, 2009.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
Internet Engineering Course Outline. Internet Engineering Course; Sharif University of Technology Aims and Contents To attain necessary skills for handling.
Network Management M. Sc. Juan Carlos Olivares Rojas
1 NES554: Computer Networks Defense Course Overview.
CSE 1340 Introduction to Computing Concepts Class 1 ~ Intro.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Workshop of Administrative Informatic I LABA Classroom, Tuesday and Thrusday at 18:00-20:00, Wednesday at 18:00-19:00 Instructor: M.C. Juan Carlos Olivares.
Administrative Preliminaries Computer Architecture.
Technical Devices for Security Management Kathryn Hockman COSC 481.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Unit 36: Internet Server Management
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls Purpose of a Firewall Characteristic of a firewall
Introduction to the course
Workshop of Administrative Informatic II
Implementing Firewalls
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Network Security I M.C. Juan Carlos Olivares Rojas Course Syllabus January, 2009

Outline Introduction Topics Evaluation Recommendations References

Introduction Actually the network security topics are very important for the organizations, because interconnectivity is a fundamental activity in the computer environments. The principal human activity is communication, this is the reason because security in computer networks is very important In this course we will study a lot of attacks related with information security through different points of view.

Introduction  In this course we will study a lot of attacks related with information security through different points of view. Also, we will study the computer network vulnerabilities and we will knows the best practices for management the information technologies in the organizations.  The course duration is 100 hours; It's divided in 4 modules and 20 activities. All activities are 5 hours of duration.

Topics 1. Cybernetic Attacks 1.1. Introduction to cybernetic attacks 1.2. Malicious code 1.3. Denial of Services 1.4. Social Engineering, scanning and information retrieval 1.5. Another kinds of attacks

Topics 2. Firewall Firewalls Advantages and Disadvantages 2.2. Host bastion 2.3. Packet Filtering 2.4. Proxy Servers 2.5. Stateful Inspection

Topics 3. Computer Networks Vulnerabilities 3.1. Evaluation of Computer Networks Vulnerabilities 3.2. Well-Know Tools 3.3. Vulnerabilities Administration 3.4. Vulnerabilities in Open Systems 3.5. Vulnerabilities in Proprietary Systems

Topics 4. Secure Architectures 4.1. Perimeter Security and Basic Frontier 4.2. DMZ Architecture (Demilitarized Zone) 4.3. Dual Firewall with DMZ 4.4. Simple Mode and High Availability 4.5. Security Zones

Evaluation The grades are obtained with the official blackboard course. All the activities: exercises and homeworks must be delivery the next class by or CD/DVD. The activities which are not qualifying will be considered in the quiz or in the partial project report. The activities average will add 10 point in one of this especial activities.

Recommendations The advisory hours should be Wednesday, Thursday and Friday at 9-10 a.m. The advisory should be by , Instant Messenger or by another electronics media MSN: Skype: juancarlosolivares

References ISACA. (2007). Preparation Manual for the Exam. CISA ISBN: Harris, S. CISSP All in one Exam Guide. Third Edition. United States: McGraw-Hill Osborne Media, ISBN:

Questions?