You are on page 1of 2
STUDENT STUDY GUIDE DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY POLITEKNIK MERSING, JOHOR COURSE DFN5033 — Network Security CREDIT(S) |3 PROGRAMME DDT4INW1, DDTAINW2, DDT4INW3 PRE-REQUISITES [DFC3023 — Introductions To Networks LECTURER Hanis Basira Abu Hasan OFFICE LOCATION Department Of Information And Communication Technology [CONTACT NUMBER [o19-6624001 EMAIL hanist yn. edu.mm COURSE SYNOPSIS NETWORK SECURITY course is designed to focus on the overall security processes based on security policy emphasizing on hands-on skill in the areas of secure perimeter, secure connectivity, identity services and intrusion /detection. The knowledge delivered shall enable students to identify some of the security approaches to design a defensive strategy in a computer network environment. Discussions on the security features of Microsoft Windows Server and Open Source Software network operating systems are also included. | COURSE LEARNING OUTCOMES (CLO) STUDENT LEARNING TIME (SLT) PLO’) (P4, PLO2) ‘Upon completion ofthis course, students should be able to: 4. Explain common network vulnerabilities and attacks, defense mechanisms against network attacks. (C4, 2. Use various tools and technologies effectively to protect the given network from attacks and threats. 3. Practice proper technique and procedure to create a secured computer network environment in organisations. (A3, P4, PLO4, PLO8, PLO2) Tecture (Dependent) 26 Practical (Dependent) {20 ‘Coursework Assessment i (Dependent) ‘Coursework Assessment i (independent) Preparation and Review 2 (independent) COURSE CONTENT 1 INTRODUCTION | + Understand the need for network security 2 TO COMPUTER cLo1 (SYN NETWORK cLoa SYN) SECURITY — | « Understand the need for network security * Understand vulnerabilities, threats and 3 | VULNERABILITIES, |___attacks i ctot 4 THREATS AND | Understand vulnerabilities, threats and cLo2z Quiz 1 5 ATTACKS attacks (SYN/ ‘* Understand the Network vulnerability ASYN) assessment * Understand firewalls 7 * Understand Intrusion Detection System Practical Task 4 7 (DS) and intrusion Prevention System (IPS) 8 SECURITY |» Understand Intrusion Detection System | CLOt 9 DEVICES AND (IDS) and Intrusion Prevention System (IPS) | CLoz 10 TECHNOLOGIES Understand Proxy Server cLos (sYN/ Understand Bastion Host and Honeypots ASYN) Explain Virtual Private Network (VPN) fundamentals © Configure Windows services u + Understand Kerberos Authentication and | CLO1 Test 12 HARDENING Domain Security cLo2 Practical Task 2 (SYN) OPERATING — [Implement the Infrastructure, clos ASYN) SYSTEMS Authentication, Auditing of Windows Understand Linux Security ‘Understand hardening physical security 13 PHYSICAL | Understand securing modems clot Quiz 2 14 ‘SECURITY cLo2 Practical Task 3 18 = Implement hardening routers Per 16 + Understand Wireless Network Security pues: (syn Practical Task 4 ASYN) REFERENCES JASSESSMENT The course assessment is carried out in two sections: Main references supporting the course: i) Continuous Assessment - (CA) 60% il) Final Examination = (FE) 40% Cisco Networking Academy (2018). CCNA Cybersecurity Operations Companion Guide. Cisco Press (ISBN 9780135165246) CONTINUOUS ASSESSMENT (CA) Troy McMillan (2018). CCNA Security Study Guide: Exam Continuous assessment is carried out throughout the 1210-260. John Wiley & Sons. (ISBN: 9781119409939) semester and comprises the followings: [| “Assessment | Quantity [Percentage | —_| Adaitional references supporting the course [Quiz 3 10% Test i 70% Network Security Essentials : Applications and Standards Practical Task 4 20% (6 Edition) (2016). Pearson. (ISBN 978013457338) Problem Based Task 4 20% Cybersecurity ~ Attack and Defense Strategies Infrastructure security with Red Team and Blue Team Tactics (2018). Packt Publishing (ISBN 9781788475297) 4. Attendance is compulsory for every student. Students are required to have at least 80% attendance. 2. Punctuality is essential. Every student is required to be in the lecture halllecture room/ workshop 5 minutes before class starts 3. Student should submit all quizzes and assignments on time 4. Allstudents must take part in every exercise! task in class. Plagiarism and cheating will be severely dealt with. 5, Students should conduc themselves in an appropriate manner following the policies and guidelines of the polytechnic. Prepared bY. HANIS BASIRAABU HASAN las Pendidikan Pengajian Thegg! (OHA) ‘Teknclog! Matiomat & Komuntka gi 3 MANSOn [C Pete werig K 1 (PRP DH 44) (Haris Basira Abu Hasan) “plone Tekn my aera ight ‘abatan Teknologi Malumat & Komunika Polk Mersin

You might also like