Apr 19, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 166 - Network Intrusion Detection

5 Credits
Designed to give a networking and digital forensics student professional a solid foundation of network and computer security tasks. Focuses on use of network logs, use of intrusion detection systems, establishment of policies and conducting vulnerability analysis. Introduces knowledge of standard default communication ports and how to alter them for securing the network. Auditing and monitoring of systems without impacting system performance is stressed. Introduces security on multiple platforms similar to the business environment. Covers viruses, worms, DoS (denial of service) and DDoS (distributed denial of service) attacks. Introduces new attack vulnerabilities.

Pre-requisite(s) CIS 161 w/min. 2.0 and CIS 215 w/min. 2.0
FeesCF

Quarters Typically Offered

Fall Day
Winter Day
Spring Day, Evening

Designed to Serve Network Security Engineer and Digital Forensics specialist studying security in the network environment; industry professionals with voice/data/video/image or text networking responsibilities.
Active Date 20190625T13:35:25

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
PLA Eligible Yes

Course Outline
  • Course Overview
  • Recognized domains of Network Security
    • Organizations
    • Common Body of Knowledge(CBK)
  • Threats
    • Hackers, Crackers, and Phrackers–how they do it
    • Internal and External Threats
  • How to conduct a Vulnerability Analysis
    • Use standard freeware like SATAN (Security Administrator Tool for Analyzing Networks)to show how to detect vulnerabilities
    • Standard items to check
  • Basic Computer Security Models
  • Physical Security
  • Access Methods
    • Network ports
    • VPNs
    • Remote Access
    • Wireless Access
  • Create a Security Policy
    • Objectives
    • Elements of an effective policy
  • Operating Systems(OS)
    • Install various OSs including current Windows version, Linux, and Macintosh
    • Review standard communications ports and their numbers
    • Close or change default ports on various OS
    • Explore vulnerabilities of different OS
  • Intrusion Detection Systems
    • Monitor network traffic
    • How to read network logs
    • How to conduct a system audit
    • Installing patches
    • Resources for updates
  • Who is on your network?
    • Use of digital certificates
    • Authenticating access using items such as Kerberos
    • Cryptography
  • Attacks on the Network
    • Install and maintain antiviral software
    • Dealing with infected machines on the network to minimize impact
    • Respond to a DoS of DDoS attack on the network to minimize impact
  • Filing and Tracking Incident Reports
  • Disaster Recovery


Student Learning Outcomes
Demonstrate how hackers/attackers gain entrance to systems.

Install multiple operating systems and close/change default ports.

Evaluate and remediate known vulnerabilities on various operating systems.

Understand and describe the components of a good security policy.

Describe the recognized domains in the Common Body of Knowledge (CBK) of Security Professionals.

Monitor traffic on a system to detect anomalies and/or possible intrusions.



Add to Portfolio (opens a new window)