I. General Information
1. Course Title:
Network Defense Capstone
2. Course Prefix & Number:
COMP 2166
3. Course Credits and Contact Hours:
Credits: 4
Lecture Hours: 4
4. Course Description:
This course is designed as a "capstone" for the IT Network and Security Degree and or Diploma to provide students with the opportunity to apply the full range of the technical, project, and communication skills. Students will work under the guidance of faculty to design, implement and document one or more complete IT solutions related to network defense for a typical set of business and/or organizational requirements such as governing frameworks and or compliance.
Career Preparation: The studies in this course will help students prepare for careers such as Security Administrator, Network Administrator, Network Engineer, Systems Analyst, and Systems Engineer, Security Administrator, Cloud Engineer, Security Engineer, IT Auditors, IT Project Manager.
5. Placement Tests Required:
Accuplacer (specify test): |
No placement tests required |
Score: |
|
6. Prerequisite Courses:
COMP 2166 - Network Defense Capstone
All Credit(s) from the following...
Course Code | Course Title | Credits |
COMP 2161 | Command Line and Scripting | 4 cr. |
COMP 2162 | Server Administration and Management | 4 cr. |
COMP 2163 | Network and Security Analysis | 4 cr. |
9. Co-requisite Courses:
COMP 2166 - Network Defense Capstone
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
Lakes Superior College, Duluth MN
- CIS 2987 CIS Capstone, 3 cr
St Cloud State University, St. Cloud MN
- SE685 Capstone Project, 3 cr
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Military Experience
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
1. Program-Applicable Courses – This course is required for the following program(s):
Computer IT Networking & Security, AAS
Computer IT Networking & Security, Diploma
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Analyze and follow a sequence of operations |
Identify and prioritize opportunities for improvement of cyber security within the context of the continuous and repeatable process to further strengthen the company's overall IT security posture and risk mitigation. |
Utilize appropriate technology |
Determine appropriate use of IT technologies in regards to risk and risk mitigation to further strengthen a company's posture in their specific line of business. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Discuss current cybersecurity trends, challenges, and industry needs;
- Examine NIST Framework in relation to previous courses within this program;
- Analyze a mockup organization, IT systems, and line of business;
- Evaluate any special considerations regarding compliance within the mockup organization;
- Identify cyber security risks using NIST Framework in a business scenario
- Assess cyber security risk using the NIST Framework in a business scenario;
- Manage cyber security risk using the NIST Framework in a business scenario; and
- Create documentation, diagrams, and IT policies with an emphasis on cyber security based on mockup organization.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Current Cyber Security Threats
- OWASP - Open Web Application Security Project
- CVSS - Common Vulnerability Scoring System
- CVE - Common Vulnerabilities and Exposures
- SANS Internet Storm Center
- US-CERT United States Computer Emergency Readiness Team
- NIST NVD - National Vulnerability Database
- CISA - Cybersecurity & Infrastructure Security Agency
- NIST (National Institute of Technology and Standards) Framework
- Purpose
- Usage
- Finding Information
- Business Scenario
- Review overall IT Infrastructure
- Examine Systems
- Determine Applications
- Classify Users
- NIST Framework Core
- Identify
- Protect
- Detect
- Respond
- Recover
- NIST Framework Implementation Tiers
- Partial
- Risk-Informed
- Repeatable
- Adaptive
- NIST Framework Profiles
- Executive
- Business Process
- Implementation and Operations
- Documentation, Diagrams, and IT Policies
- Risk Assessment Matrix
- IT Network Diagrams
- IT Process Diagrams
- NIST Documentation
- Cyber Security Improvement
- Prioritize and Scope
- Orient
- Create a Current Profile
- Conduct a Risk Assessment
- Create a Target Profile
- Determine, Analyze and Prioritize Gaps