Revised 8/2023

ITN 266 - Network Security Layers (3 CR.)

Course Description

Provides an in-depth exploration of various security layers needed to protect the network. Explores Network Security from the viewpoint of the environment in which the network operates and the necessity to secure that environment to lower the security risk to the network. Includes physical security, personnel security, operating system security, software security and database security. Lecture 3 hours per week.

General Course Purpose

The purpose of this course is to introduce the student to the tools and concepts used at different layers to protect our network assets. Students will be expected to understand how to install and “harden” Windows servers and Linux servers through the application of patches, removing unnecessary services and accounts, and using vulnerability scanners (i.e. Nessus, GFI LanGuard) to identify and remediate vulnerabilities within the O/S or application. This course also includes content, as indicated below in parenthesis behind each learning objective, which directly maps to DHS/NSA’s Center of Academic Excellence – 2 Year (CAE2Y) criteria.

Course Prerequisites/Corequisites

Prerequisite: ITN 260

Course Objectives

Upon completion of this course, the student will have a working knowledge of:

  • The danger to the network presented by trusted employees
  • The concept and principles of in-depth security
  • Physical and personnel security
  • Operating system, application software, and database security

Major Topics to Be Included

  • Physical Security
  • Personnel Security
  • Computer System Security
  • Local Area Network Security
  • Application Software Security
  • Communication Security
  • Database Security

Student Learning Outcomes

Physical Security (CSF)
  • Understand the operating environment of the network and the need for physical security.
  • Identify the threats to security that are unique to physicals security.
  • Identify and explain the access controls necessary to physically secure a network facility.
  • Understand the necessity for a fire safety program in securing the physical facility.
  • Identify and describe the components of fire detection and response.
  • Understand the necessity to secure the supporting facilities such as heating, air conditioning, temperature, humidity, etc.
  • Understand the technical details associated with Uninterruptible Power Supplies (UPS) and their ability to increase availability.
  • Understand and explain the countermeasures to the physical theft of computer or network devices.
  • Understand the necessity to maintain an accurate physical inventory of all computer and network devices.

Personnel Security (CPM) (CSP)

Understand how the organization’s employment policies support organizational security.

Understand the need for the separation of duties.

  • Understand the relationship and interaction between the employee job description, performance evaluation, the standards manual and security.
  • Understand the relationship between reference checks, background investigations, interviews.
  • Understand the impact of employee education, employee relationships and management and supervisory practices upon security.
  • Understand how continuous employee observation, job rotations, access control and adherence to standards impact security.
  • Understand how terminations due to events such as promotion, resignation, death, retirement, layoff and firing (hostile terminations) should be handled and their potential impact upon security.
  • Computer System Security (OSC, OSA, OSH)
  • Identify and explain the key Linux security components.
  • Identify and explain the Linux file systems controls.
  • Identify and explain the Linux files used to manage network functions.
  • Identify and explain Linux network running process and networking commands.
  • Describe the various techniques for hardening Linux operating system applications.
  • Identify and explain the key Windows server security components.
  • Identify and explain the value of the Active Directory and its role in security.
  • Identify and explain Windows server authentication methods.
  • Identify and explain Windows server user and group security methodologies.
  • Understand the Windows server security configuration tools, file and folder security, EFS, NAT, and IPSec
  • Understand the importance of patching and maintaining O/S updates and vulnerability windows.
  • Demonstrate the application of cyber defense methods to prepare a Linux or Windows system to repel attacks.
  • Local Area Network Security (ANT, BNW, NDF, IDS)
  • Understand the design of the network and its impact upon network security.
  • Understand and explain the components relating to end user access.
  • Describe the value associated with policy based security management of the network.
  • Understand the impact on network security of IP address assignment.
  • Understand the different network media types, their threats and how best to secure them.
  • Explain the impact of cable installation on security particularly with regard to plenum cables and risers.
  • Understand the threats against routers, hubs and switches and how best to secure them.
  • Understand the employment of firewalls, IDS and auditing in securing the network.
  • Application Software Security (SPP, ISC)
  • Understand and explain the software development life cycle and its relation to security.
  • Understand and explain software quality assurance and its relation to security.
  • Understand and explain software configuration management and its relation to security.
  • Understand and explain software testing and its relation to security.
  • Identify and explain the various type of malicious code.
  • Understand the buffer overflow problem and the threat it poses to security.
  • Understand the importance of maintaining application patches and updates.
  • Understand the importance of hardening applications and resources available (i.e. DISA STIGs).
  • Communication Security (BCY, NDF)
  • Understand the OSI seven layer communication model and the TCP model.
  • Identify and explain the threats various attacks against the communication systems and their countermeasures.
  • Discuss the process of encryption and its key terms.
  • Understand the difference between symmetric and asymmetric encryption.
  • Understand digital signatures and Public key Encryption (PKE).
  • Understand IPSec and Virtual Private Networks (VPN).
  • Understand and explain the issues surrounding email security and privacy.

Database Security (DBA, DAT)

  • Understand the concept of a database and the database terms (including aggregation, polyinstantiation, data mining, inference, etc.).
  • Understand the different type database and the components that compose database.
  • Understand the issues associated with physical database integrity, logical database integrity, element integrity, auditability, access control, user authentication and availability.
  • Understand and explain the issue of two-phase, data redundancy and internal consistency.
  • Understand the issue associated with indirect attacks against databases that report only statistical data.
  • Understand the security issues associated with multilevel database.
  • Understand the importance of hardening a database and resources available (i.e. DISA STIGs).

CAE2Y Knowledge Unit Domain Index

KU Category Course Content KU Mapping CAE2Y KU Name Description
Foundational CDE Knowledge Units CSF Cybersecurity Foundations Provide students with a basic understanding of the fundamental concepts behind cybersecurity. This is a high level introduction or familiarization of the Topics, not a deep dive into specifics.
CSP Cybersecurity Principles Provide students with basic security design fundamentals that help create systems that are worthy of being trusted.
ISC IT Systems Components Provide students with a basic understanding of the components in an information technology system and their roles in system operation. This is a high level introduction or familiarization of the Topics, not a deep dive into specifics.
Core Technical CDE Knowledge Units BCY Basic Cryptography Provide students with a basic ability to understand where and how cryptography is used.
BNW Basic Networking Provide students with basic understanding of how networks are built and operate, and to give students some experience with basic network analysis tools. Students are exposed to the concept of potential vulnerabilities in a network.
NDF Network Defense Provide students with knowledge of the concepts used in defending a network, and the basic tools and techniques that can be taken to protect a network and communication assets from cyber threats.
OSC Operating Systems Concepts Provide students with an understanding of the roles of an operating system, its basic functions, and the services provided by the operating system.
Core Non-Technical CDE Knowledge CPM Cybersecurity Planning and Management Provide students with the ability to develop plans and processes for a holistic approach to cybersecurity for an organization.
Optional Knowledge Units ANT Advanced Network Technology and Protocols Provide students with an understanding of advanced networking concepts, including the latest network technologies and more complex security issues involved in network communications. Examples may include (but are not limited to): software defined networking, converged voice/data networking
DAT Database Teach students how database systems are used, managed, and issues associated with protecting the associated data assets.
DBA Data Administration DBA provide students with methods to protect the confidentiality, integrity, and availability of data throughout the data life cycle.
IDS Intrusion Detection/Prevention Systems Provide students with knowledge and skills related to detecting and analyzing vulnerabilities and threats and taking steps to mitigate  associated risks.
OSA Operating Systems Administration Provide students with skill to perform basic operations involved in system administration of operating systems.
OSH Operating Systems Hardening Provide students with the ability to apply methods such as managing applications, services, and network ports to improve the robustness of operating  systems.
SPP Secure Programming Practices Provide students with an understanding of the characteristics of secure programs and the ability to implement programs that are free from vulnerabilities.