You are on page 1of 5

COURSE TITLE: Microsoft Network Security COURSE NUMBER: CINT 253 PREREQUISITES: CINT 225 Windows Network Operating

Systems SCHOOL: Business PROGRAM: Computer Information Technology CREDIT HOURS: 3 INSTRUCTOR Roger Young PHONE: 289-7001 Ext 5444; E-MAIL: OFFICE HOURS: Wednesday/ Thursday 3-5 PM room 2135. Notes: To contact me you may call, use email or stop by the office. The best way to contact me is by email. Immediate supervisor contact information: Professor Neamen Berhanu,, Tel 574-289-7001 EXT 5331. CATALOG DESCRIPTION: This course teaches the fundamentals of implementing and administering security on Windows Server networks. This course will provide instruction to demonstrate the ability to implement, administer, and troubleshoot information systems that incorporate Microsoft Windows Server. Textbook: Byron Wright, 70-298: MCSE Guide to Designing Security for a Microsoft Windows Server 2003 Network. Course Technology Incorporated, 2005, ISBN 0-619-12021-5 MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:
1. Design authentication for user security using PKI, IAS, CA, Forest and Domain models

including account and password requirements, and file/folder encryption.
2. Design a strategy for hardening client operating systems and restricting user access to

operating system features for desktop and various types of portable devices.
3. Secure an AD/DNS implementation. 4. Create a schema for the administration of servers using tools such as MS management

console, terminal server, remote desktop, remote assistance, telnet, software update services and group policy. 5. Design security for data using 802.1x authentication for wireless networks, RADIUS, IIS and VPN. 6. Design security for servers that have specific roles; e.g., domain controller, network infrastructure server, file server, IIS server, terminal server, and POP3 mail server then create a plan to modify baseline security templates according to role. 7. Create a network design from conceptual through physical for network infrastructure security using industry standard design and security practices. COURSE CONTENT: Topical areas of study include ± Creating the conceptual design for network infrastructure security by gathering and analyzing business and technical requirements Creating the logical design for network infrastructure security Creating the physical design for network infrastructure Designing an access control strategy for data

edu/library and choose the Virtual Library link for your campus. Look for evacuation procedures posted in your classrooms. therefore. CERTIFICATION/LICENSURE TRAINING DISCLAIMER: Ivy Tech cannot guarantee that any student will pass a certification or licensing exam. notify your instructor immediately. you are required to register with Disability Support Services at the beginning of the semester. tests or other academic works is a violation of College rules. but is not limited to. LAST DATE TO DROP: July 17. This includes students who aid and abet as well as those who attempt such behavior. Certification and Licensure exam questions are drawn from databases of hundreds of possible questions. and other resources essential for completing course assignments. may be construed as cheating. Ivy Tech State College Virtual Library: For students on-and off-campus. 2011 COURSE ACTIVITY DISCLAIMER: The instructor reserves the right to alter the type and sequence of activities scheduled for this course. Cheating on papers.89% = B 70% . General Education skills are assessed in selected courses through an authentic assessment project to evaluate curriculum effectiveness. a thorough understanding of the subject matter is required. GENERAL EDUCATION OUTCOMES: Ivy Tech State College is committed to graduating students who have the appropriate technical and general education skills. books. METHOD(S) OF EVALUATION: Homework and Quizzes 35% Laboratory assignments 15% Midterm examination 20% Final examination 20% GRADING: 90% . The goal of Ivy Tech in providing a certification exam studies class is to assist you in understanding the material sufficiently to provide a firm foundation for your studies as you prepare for the exam. in the judgment of the instructor of the class.79% = C 60% .Creating the physical design for client infrastructure security ACADEMIC HONESTY STATEMENT: The College is committed to academic integrity in all its practices. The faculty value intellectual integrity and a high standard of academic conduct. Activities that violate academic integrity undermine the quality and diminish the value of educational achievement. the Virtual Library offers full text journals. If you need an accommodation because of a documented disability.ivytech. Your success will be determined by several factors beyond the instruction you are given in the classroom including your test-taking skills. plagiarism or other forms of academic dishonesty such as the acquisition without permission of tests or other academic materials and/or distribution of these materials and other academic work.100% = A 80% . and your satisfactory completion of appropriate practice exams. ADA STATEMENT: Ivy Tech seeks to provide effective services and accommodations for qualified individuals with documented disabilities. No student shall engage in behavior that. Go to http://www.69% = D . This may include. If you will require assistance during an emergency evacuation. your willingness to study outside of class.

outside material relevant to topics being covered. Discussion is encourages as are student-procured. General Education skills are assessed in selected courses through an authentic assessment project to evaluate curriculum effectiveness. Students will take careful notes as no all material can be found in text or readings. .Class participation 10% 100% Below 60% = F GENERAL EDUCATION OUTCOMES: Ivy Tech State College is committed to graduating students who have the appropriate technical and general education skills. ACADEMIC HONESTY STATEMENT: Course Outline (14-week) Week 1 2 3-4 5 6-7 8 9 10 11-12 13-14 15 16 Topics Introduction to Course and Virtualization Designing a Secure Network Framework Securing Servers Based on Function Designing a Secure Public Key Infrastructure Securing the Network Management Process Securing Network Services and Protocols Securing Internet Information Services Securing VPN and Extranet Communications Securing Active Directory Securing Network Resources Securing Network Clients Final Examination Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Mid-term Exam Chapter Readings Exams TEACHING METHODS: Lectures: Important materials from the text and other sources will be covered in class. Demonstrations: Much of the class time will be used to demonstrate the practical use of the software for this course. Students are encouraged to carefully observe demonstrations and to go through the tutorial material in the textbook.

Exams: Several exams are given. All pages of the same assignment must be stapled together in the upper left had corner. You will also want to find a style guide such as the . Attendance and participation do affect your grade for the course. GENERAL CLASS INFORMATION: Follow the Tentative Assignment Schedule attached by completing assignments every week and submitting them to your instructor by the due date. All papers submitted for credit must be identified with your name. These assignments require the application of various software packages. Generally. These exams are times so it is important that the student not only know the skills. Exams are ³hands on´ in that you are given a set of instructions to follow to produce the required result. and readings are periodically assigned to help support and supplement material. Any quiz or test taken late will result in a one-letter grade reduction. Make-up for regular assignment will not be accepted later than one week after the original due date. If you stop attending class and do not submit a Drop Form to Student Services before this date. Quizzes: Occasional scheduled or unscheduled quizzes can be given to help ensure students stay up with assigned material. students are required to turn in what they have completed at that point.Assignments: Problems. Occasionally there are errors in the textbook. course number. Any ³F´ you receive for any course you take at Ivy Tech State College will remain permanently on your transcript. Study and be prepared to take all quizzes and tests by the dates scheduled. these should be apparent to you and you can make any necessary adjustments. but also know them well enough to move quickly through the test. Turning in late assignments will result in a lower grade than if the assignment is turned in on time. and assignment or exercise number. Your individual skill level will determine how many hours per week you will need to spend to complete your assignments. you will receive a grade of ³F´ for this course. When the time for the test has passed. Written Requirement or Term paper. you must contact the Coordinator for Students with Disabilities in a timely fashion. require assistance in evacuating the building in an emergency. instructor¶s name. or have any special medical conditions about which we should know. Verifying disabilities and arranging for appropriate accommodations may be a lengthy process. this is an upper level and class and the paper that is required should be 10-12 pages using 12 point font. The last day to withdraw for this semester is April 8. If you will be requesting accommodations or services relating to a disability. cases. 2012.

Caution the book has some violence so you may wish to choose another source if that is a concern. There is a good explain of the process in the Novel by Tom Clancy. The subject will be Steganography and a cipher for setting a key code for transmitting encoded messages.APA Style Guide or the Chicago Style Guide and of course a current word processor with a spelling checker. Send the paper to me by email not later than the 12th week of class. . title Dead or alive.