Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor.

Slides:



Advertisements
Similar presentations
Chapter 3: Software Basics Section I: Preparing to Use Technology.
Advertisements

CGS 1000-SPRING 2008 Introduction to Computers and TechnologyIntroduction to Computers and Technology.
Decision Support Systems Professor Pat Paulson MIS 462 Spring 2011.
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
Chapter 0 Introductory Comments. Overview Syllabus Detailed power point slides My Web Page –Homework on web page –Readings –Other.
Fall 2004 WWW IS112 Prof. Dwyer Intro1: Overview and Syllabus Professor Catherine Dwyer.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Postgraduate Essentials University of Edinburgh Postgraduate Essentials Online induction to the course.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Welcome to CJ227: Criminal Procedure
1 Data Communications and Network Management ISQS 6341, Summer II, 2001 Instructor: Zhangxi Lin Office: BA 708 Phone:
IT Introduction to Website Development Welcome!
Welcome to AC122 Payroll Accounting 1. AC122 Payroll Accounting Seminar 1 Jim Eads, CPA, MST, MSF 2.
Dr. Sha Li Computer-Based Instructional Technology College of Education, Humanities, and Behavioral Sciences AAMU Introduction to FED 529 Course Online.
Active Learning Ideas WebCT. Level 1: Web supported / Web-presence Web supported (Web-presence) courses are courses where basic materials about the course.
Presented by Janine Termine Welcome 095 Basic Algebra.
IT 499 Bachelor Capstone Week 8. Adgenda Administrative Review UNIT Seven UNIT Eight Project UNIT Nine Preview Project Status Summary.
1 Introduction to Operating Systems 9/16/2008 Lecture #1.
Business Discipline Breakout Session Summer 2000 ION Conference Facilitated By: Marcy Satterwhite.
MT 460 – Strategic Management Kaplan University Kathryn Hollywood, PhD.
Management Information Systems Professor Pat Paulson.
MIS 300: Introduction to Management Information Systems Yong Choi School of Business Administration CSU, Bakersfield.
Google Drive. Google Docs Google Drive is the new home for Google Docs Create and share your work online and access your documents from anywhere Manage.
1 Database Management for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. GSM 274/FEMBA 274 Spring 2002.
FALL 2011 TECHNICAL ORIENTATION. Session starts at 11:00 am We’ll be online shortly Speaker test starts about 10:45 To ask questions, use the chat window.
Microcomputers in Business.  Instructor: Pat Paulson, Somsen  Office hours listed on web site  , Office Communicator:
An Orientation: General Psychology Online. The Course Menu Shown on the far left is the menu used to navigate our Psychology course.
CT 1503 Network Operating Systems Instructor: Dr. Najla Al-Nabhan 2014.
HS-210 Medical Office Management. Why Medical Assisting? Why did you choose to become a medical assistant/MOM? Everyone please post a response.
HOW I SURVIVED MINF3650 AND LEARNED TO LOVE INFORMATION SYSTEMS Fall 2015 Edition.
HOW I SURVIVED A SCHULTZ COURSE AND LEARNED TO LOVE INFORMATION SYSTEMS Fall 2014 Edition.
Where are you joining us from
SC300 Unit one Prof. Julie Shertzer AIM: JulieShertzer.
IT461 Advanced Visual Basic Unit 1: Course Introduction Sydney Liles AIM: sydneyliles.
Welcome to Academic Strategies CS Janine Przybyl "When there is a start to be made, don't step over! Start where you are." ~Edgar Cayce.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
CEN First Lecture CEN 4010 Introduction to Software Engineering Instructor: Masoud Sadjadi
Introduction to Operating Systems CCSA 125 L.Deema ALShoaibi.
1 Sacramento City College- Jo-Ann Foley D2L Orientation.
Technical Orientation Summer Technical Orientation  Session starts at 11:00 am  We’ll be online shortly  Speaker test starts about 10:45  To.
MIS 452 Fall 2010 Management of Telecommunication Systems.
Robert Workman Southern Connecticut State University Prepared for presentation at the: World Conference on E-Learning New Orleans,
CM220 College Composition II Friday, January 29, Unit 1: Introduction to Effective Academic and Professional Writing Unit 1 Lori Martindale, Instructor.
Dr. Jeff Cummings MIS323 Business Telecommunications.
Welcome to Human Behavior and the Social Environment Dawn Burgess, Ed. D.
UNIT 4 SEMINAR: Know Your Sources --Unit 4 Project explained --Quality academic sources --Using the Kaplan Library --Questions and Answers about the assigned.
Computer Networks CNT5106C
IST-454 Computer Forensics. Objectives Understand the different aspects of computer and cyber crime Understand the basic concepts and issues of computer.
CS Computer Architecture Fall 2010 Dr. Angela Guercio ( Course Web Page
Something to talk about: While we wait for class to start at the top of the hour, please share at least one healthy tip that you think others can benefit.
Welcome to EP299! LaToya Blackshear. Agenda Welcome! Introduce Yourself! Course Overview Final Project - Portfolio Week 1 Assignments Week 1 Project Week.
WELCOME TO MICRO ECONOMICS AB 224 Discussion of Syllabus and Expectations in the Class.
WELCOME TO MANAGERIAL ECONOMICS MT 445 Discussion of Syllabus and Expectations in the Class.
IMS 4212: Course Introduction 1 Dr. Lawrence West, Management Dept., University of Central Florida ISM 4212 Dr. Larry West
“Babeş-Bolyai” University Faculty of Economics and Business Administration Second semester 1st year, English line of study Business IT Introductive course.
PD 101 New Faculty Orientation Marla Cartwright Seminar.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
Welcome CPS 111 – Introduction to Technology for Educators Instructor: Ms. Rudolph Photos Courtesy of Teachers Discovering Computers Textbook.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Welcome to MT140 Introduction to Management Unit 1 Seminar – Introduction to Management.
We will begin at 9 PM This is an Audio Seminar. Please be sure to adjust your audio. When reviewing the archived seminar this document will provide the.
AB104-01Personal Financial management. Welcome to AB104 Syllabus-Textbook Info, Calculator Info Grading -Availability of grades -1week after due date.
Computer Networks CNT5106C
MIS323 Business Telecommunications
CPSC 441: Computer Communications
INF 103 Teaching Effectively-- snaptutorial.com
INF 103 Education for Service-- tutorialrank.com
EE422C Software Design and Implementation II
MIS323 Business Telecommunications
Presentation transcript:

Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor

Seminar 1IT484 - Network Security2 Who am I? Please allow me to introduce myself. Work Experience – 12 years as a IS security professional. Education – 2 Master Degrees and a PhD in Leadership Studies. Completing a Doctorate Degree in Digital Systems Security. Over 20 of University teaching. CISSP Coach Home is San Antonio, Texas (no comments about the SPURS, please).

Seminar 1IT484 - Network Security3 Our Seminar In this introductory seminar, we will discuss the course syllabus and course requirements. Please review the syllabus posted under Course Home before the chat session. Course communication occurs through the seminars, postings to discussion threads, and through , and we will discuss the expectations and requirements for using these course communication tools. Although attending the seminars is optional, you are strongly encouraged to attend. Students who attend the seminars with their instructors have a better understanding of the course material and expectations, and therefore tend to earn better grades. For instructions on how to access your seminar, click on the Academic Success tab under Course Home.

Seminar 1IT484 - Network Security4 Projects For Our Course There will be four Hands-On Projects in this course that take the place of a Final Exam or Midterm Exam: Project 1 spans Units 2-3. You will develop a security plan for a hypothetical LAN. This is a personal project. Project 2 spans Units 4-5. You will implement a PGP security solution for the class. This is a team project. Project 3 spans Units 6-7. You will explore software/hardware SOHO firewall solutions. This is a team project. Project 4 spans Units 8-9. You will explore software/hardware solutions for VPN connectivity. This is a team project. The Hands-On Projects are each due at the end of the two-week period.

Seminar 1IT484 - Network Security5 Course Expectations Please be aware that several things are taken into consideration of evaluating your Discussion grade. 1. I look at the quality and depth of your response. Remember, this an upper division course. Expectations are high in search of scholarly advancement within this course. Our class wants to succeed. 2. I look at how many messages did you actually read and how much time you spend on this effort. 3. I determine if you posted at least two (2) items. Some students are not successfully posting their responses in the appropriate area. 4. I look at the number of NEW messages you post. Quantity and quality are factored in. 5. Did you reply back to any students who responded to you. This number is also examined.....I know, I know. I am asking a lot. But, please know that you will benefit from the extra effort. "The Greater the Effort, the Greater the REWARD". Feel free to me with any concerns, questions, comments, issues.

Seminar 1IT484 - Network Security6 Textbook Information Note the textbook is an eBook and the files are located in DocSharing. If you would like to purchase a hardcopy of the textbook, the information is below. Title: Hacking Exposed Author: McClure ISBN: Publisher: MCG

Seminar 1IT484 - Network Security7 Unit 1 – Discussion (review) 1. Your name 2. Why you signed up for this particular course 3. Any prior knowledge you may have about this topic 4. Your current and/or future educational goals 5. What your expectations are for this course

Seminar 1IT484 - Network Security8 The Next Unit - Expectations Read Chapter 1 and 2 in Fundamentals of Network Security (pp. 3 to 37). In this reading assignment, you will read about the history of information security and how eavesdropping works. You will study the basic architecture used to secure information contained on data networks including firewalls, access control mechanisms, and encryption. Most importantly, you will learn that security is a process, not a collection of tools and products.

Seminar 1IT484 - Network Security9 The Next Unit - con’t. Read the essay questions in Chapters 1 and 2 and compose a paragraph or two in response to each question. Your project should be at least three pages of double spaced text.

Seminar 1IT484 - Network Security10 Hands-On Project 1: Develop a Security Plan for a Hypothetical LAN This Hands-On Project will span Units 2 and 3 and is due by the end of Unit 3. Your deliverable is a 12-page, double-spaced report that has a title page, abstract, a table of contents, a main body, and a list of references at the end. Save your report as a Word document. This is a personal project, you will NOT be working on a team.

Seminar 1IT484 - Network Security11 The Hypothetical LAN Imagine a hypothetical LAN for a small 100-person business, Pixel Inc. The business occupies one floor in an office building. Everybody has a computer on his or her desk, and there are servers for the Web, file & print sharing, , database, and a small 3D render farm, a rack of 20 dual processor Xeon servers running Red Hat Linux 9.0 that generates the actual high-resolution video animations that Pixel produces for its clients. The desktop systems consist of Apple G5 desktops running Mac OS X for the creative staff, and Windows XP PC computers for general use. The servers are Windows Server 2003 running Microsoft Exchange. The Web and file & print servers are PC computers running Red Hat Linux 9.0. Network hardware through Ethernet and the hardware is a mixture from Cisco and Hewlett-Packard.

Seminar 1IT484 - Network Security12 Any Questions Any problems, issues, concerns?