Presentation is loading. Please wait.

Presentation is loading. Please wait.

Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor.

Similar presentations


Presentation on theme: "Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor."— Presentation transcript:

1 Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor

2 Seminar 1IT484 - Network Security2 Who am I? Please allow me to introduce myself. Work Experience – 12 years as a IS security professional. Education – 2 Master Degrees and a PhD in Leadership Studies. Completing a Doctorate Degree in Digital Systems Security. Over 20 of University teaching. CISSP Coach Home is San Antonio, Texas (no comments about the SPURS, please).

3 Seminar 1IT484 - Network Security3 Our Seminar In this introductory seminar, we will discuss the course syllabus and course requirements. Please review the syllabus posted under Course Home before the chat session. Course communication occurs through the seminars, postings to discussion threads, and through email, and we will discuss the expectations and requirements for using these course communication tools. Although attending the seminars is optional, you are strongly encouraged to attend. Students who attend the seminars with their instructors have a better understanding of the course material and expectations, and therefore tend to earn better grades. For instructions on how to access your seminar, click on the Academic Success tab under Course Home.

4 Seminar 1IT484 - Network Security4 Projects For Our Course There will be four Hands-On Projects in this course that take the place of a Final Exam or Midterm Exam: Project 1 spans Units 2-3. You will develop a security plan for a hypothetical LAN. This is a personal project. Project 2 spans Units 4-5. You will implement a PGP email security solution for the class. This is a team project. Project 3 spans Units 6-7. You will explore software/hardware SOHO firewall solutions. This is a team project. Project 4 spans Units 8-9. You will explore software/hardware solutions for VPN connectivity. This is a team project. The Hands-On Projects are each due at the end of the two-week period.

5 Seminar 1IT484 - Network Security5 Course Expectations Please be aware that several things are taken into consideration of evaluating your Discussion grade. 1. I look at the quality and depth of your response. Remember, this an upper division course. Expectations are high in search of scholarly advancement within this course. Our class wants to succeed. 2. I look at how many messages did you actually read and how much time you spend on this effort. 3. I determine if you posted at least two (2) items. Some students are not successfully posting their responses in the appropriate area. 4. I look at the number of NEW messages you post. Quantity and quality are factored in. 5. Did you reply back to any students who responded to you. This number is also examined.....I know, I know. I am asking a lot. But, please know that you will benefit from the extra effort. "The Greater the Effort, the Greater the REWARD". Feel free to email me with any concerns, questions, comments, issues.

6 Seminar 1IT484 - Network Security6 Textbook Information Note the textbook is an eBook and the files are located in DocSharing. If you would like to purchase a hardcopy of the textbook, the information is below. Title: Hacking Exposed Author: McClure ISBN: 0072260815 Publisher: MCG

7 Seminar 1IT484 - Network Security7 Unit 1 – Discussion (review) 1. Your name 2. Why you signed up for this particular course 3. Any prior knowledge you may have about this topic 4. Your current and/or future educational goals 5. What your expectations are for this course

8 Seminar 1IT484 - Network Security8 The Next Unit - Expectations Read Chapter 1 and 2 in Fundamentals of Network Security (pp. 3 to 37). In this reading assignment, you will read about the history of information security and how eavesdropping works. You will study the basic architecture used to secure information contained on data networks including firewalls, access control mechanisms, and encryption. Most importantly, you will learn that security is a process, not a collection of tools and products.

9 Seminar 1IT484 - Network Security9 The Next Unit - con’t. Read the essay questions in Chapters 1 and 2 and compose a paragraph or two in response to each question. Your project should be at least three pages of double spaced text.

10 Seminar 1IT484 - Network Security10 Hands-On Project 1: Develop a Security Plan for a Hypothetical LAN This Hands-On Project will span Units 2 and 3 and is due by the end of Unit 3. Your deliverable is a 12-page, double-spaced report that has a title page, abstract, a table of contents, a main body, and a list of references at the end. Save your report as a Word document. This is a personal project, you will NOT be working on a team.

11 Seminar 1IT484 - Network Security11 The Hypothetical LAN Imagine a hypothetical LAN for a small 100-person business, Pixel Inc. The business occupies one floor in an office building. Everybody has a computer on his or her desk, and there are servers for the Web, file & print sharing, email, database, and a small 3D render farm, a rack of 20 dual processor Xeon servers running Red Hat Linux 9.0 that generates the actual high-resolution video animations that Pixel produces for its clients. The desktop systems consist of Apple G5 desktops running Mac OS X for the creative staff, and Windows XP PC computers for general use. The servers are Windows Server 2003 running Microsoft Exchange. The Web and file & print servers are PC computers running Red Hat Linux 9.0. Network hardware through Ethernet and the hardware is a mixture from Cisco and Hewlett-Packard.

12 Seminar 1IT484 - Network Security12 Any Questions Any problems, issues, concerns?


Download ppt "Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor."

Similar presentations


Ads by Google