I. General Information
1. Course Title:
Network Intrusion
2. Course Prefix & Number:
COMP 2155
3. Course Credits and Contact Hours:
Credits: 3
Lecture Hours: 3
4. Course Description:
This course examines ethical hacking and information systems security auditing. Students will focus on the current security threats, advanced attack vectors, and practical real time demonstration of the latest hacking techniques, methodologies, tools, tricks, and security measures. The course will explore pentesting (Penetration Testing), hacking and securing systems. The lab intensive environment provides student’s in-depth knowledge and practical experience with the current security systems. Foundational concepts include how perimeter defenses work and scanning and attacking networks. Students will learn how intruders escalate privileges and what steps can be taken to secure information technology system. Content topics include: intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows, and virus creation. Career preparation: GSEC, GSED, CCNA, MCTA, MCSA, security analyst, information security officer, network security administrator, network security engineer, security systems analyst, (LAN) administrator, wide area network (WAN) administrator, IT support technician, and network manager. Certification preparation: GIAC Security Essentials (GSEC), GIAC Certified Enterprise Defender (GCED), GIAC Certified Intrusion Analyst (GCIA), Security Certified Network Professional (SCNP)
5. Placement Tests Required:
Accuplacer (specify test): |
No placement tests required |
Score: |
|
6. Prerequisite Courses:
COMP 2155 - Network Intrusion
All Course(s) from the following...
Course Code | Course Title | Credits |
COMP 2111 | Security Essentials | 4 cr. |
9. Co-requisite Courses:
COMP 2155 - Network Intrusion
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
Pine Technical College, CSEC 2310 Network Intrusion, 3 cr
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Military Experience
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
Program-Applicable Courses – This course is required for the following program(s):
Network Administration - Cyber Security, A.A.S Degree
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Assess alternative solutions to a problem |
Analyze current security threats and attack vectors and apply appropriate countermeasures. |
Analyze and follow a sequence of operations |
Demonstrate common hacking techniques. |
Utilize appropriate technology |
Employ pentesting, hacking and securing information technology systems. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Analyze current security threats and attack vectors;
- Apply appropriate countermeasures to security threats;
- Demonstrate common hacking techniques;
- Demonstrate common methodologies, tools, and tricks
- Demonstrate common security measures;
- Employ pentesting, hacking and securing information technology systems;
- Apply perimeter defenses;
- Explain policy creation; and
- Explain social engineering, DDoS attacks, buffer overflows, and virus creation.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Network security
- Security policies
- Network security threats
- IDS and IPS
- Hardening physical security
- Firewalls
- Packet filtering and proxy servers
- Wireless network security
- Web security
- Email security
- Authentication, encryption and digital signatures
- Creating fault tolerance
- Incident response
- Disaster recovery planning and risk analysis
I. General Information
1. Course Title:
Network Intrusion
2. Course Prefix & Number:
COMP 2155
3. Course Credits and Contact Hours:
Credits: 3
Lecture Hours: 3
4. Course Description:
This course examines ethical hacking and information systems security auditing. Students will focus on the current security threats, advanced attack vectors, and practical real time demonstration of the latest hacking techniques, methodologies, tools, tricks, and security measures. The course will explore pentesting (Penetration Testing), hacking and securing systems. The lab intensive environment provides student’s in-depth knowledge and practical experience with the current security systems. Foundational concepts include how perimeter defenses work and scanning and attacking networks. Students will learn how intruders escalate privileges and what steps can be taken to secure information technology system. Content topics include: intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows, and virus creation. Career preparation: GSEC, GSED, CCNA, MCTA, MCSA, security analyst, information security officer, network security administrator, network security engineer, security systems analyst, (LAN) administrator, wide area network (WAN) administrator, IT support technician, and network manager. Certification preparation: GIAC Security Essentials (GSEC), GIAC Certified Enterprise Defender (GCED), GIAC Certified Intrusion Analyst (GCIA), Security Certified Network Professional (SCNP)
5. Placement Tests Required:
Accuplacer (specify test): |
No placement tests required |
Score: |
|
6. Prerequisite Courses:
COMP 2155 - Network Intrusion
All Course(s) from the following...
Course Code | Course Title | Credits |
COMP 2111 | Security Essentials | 4 cr. |
9. Co-requisite Courses:
COMP 2155 - Network Intrusion
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
Pine Technical College, CSEC 2310 Network Intrusion, 3 cr
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Military Experience
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
1. Program-Applicable Courses – This course is required for the following program(s):
Network Administration - Cyber Security, A.A.S Degree
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Analyze and follow a sequence of operations |
Demonstrate common hacking techniques. |
Utilize appropriate technology |
Employ pentesting, hacking and securing information technology systems. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Analyze current security threats and attack vectors;
- Apply appropriate countermeasures to security threats;
- Demonstrate common hacking techniques;
- Demonstrate common methodologies, tools, and tricks
- Demonstrate common security measures;
- Employ pentesting, hacking and securing information technology systems;
- Apply perimeter defenses;
- Explain policy creation; and
- Explain social engineering, DDoS attacks, buffer overflows, and virus creation.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Network security
- Security policies
- Network security threats
- IDS and IPS
- Hardening physical security
- Firewalls
- Packet filtering and proxy servers
- Wireless network security
- Web security
- Email security
- Authentication, encryption and digital signatures
- Creating fault tolerance
- Incident response
- Disaster recovery planning and risk analysis