CET 2685 - Implementing Cisco Network Security
College of Computer & Information Technology
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Spring 2021 (585)
Requisites
Prerequisite CET 2615 with a minimum grade of C or
Prerequisite CCNA certification
Prerequisite CCNA certification
Learning Outcomes and Objectives
- The student will evaluate the need for network security components by:
- defining the steps hackers use to build a footprint of a network and compromise devices.
- describing the major types of network attacks.
- identify the best methods and technologies to mitigate each type of attack.
- The students will implement device hardening and AAA services to control administrative access to network infrastructure by:
- configuring Secure Shell (SSH) and device hardening on network equipment.
- employing event logging and identifying Cisco log severity levels.
- describing the functional components of authentication, authorization, and accounting.
- identifying the list of methods the AAA authentication process will query in sequence.
- configuring an authentication server to control login and command authorization.
- The student will analyze the need for and implement network security devices using IPS by:
- describing the primary functions and components of IPS.
- configuring IPS to work in an integrated network security design topology.
- testing and verifying the operation of IPS in an integrated network security design topology.
- The student will implement network security devices within an integrated network security design topology using VPNs by:
- describing the primary functions and components of VPNs.
- configuring a VPN to work in an integrated network security design topology.
- testing and verifying the operation of a VPN in an integrated network security design topology.
- describing the primary functions and components of the IPSec encryption protocols.
- configuring IPSec between Cisco routers to create a secure communication environment.
- The student will implement hardware firewalls within an integrated network security design topology by:
- describing the primary functions and components of a hardware firewall.
- describing how a firewall examines traffic passing through it and applies various rules to it.
- configuring a hardware firewall to work in an integrated network security design topology.
- testing and verifying the operation of a hardware firewall in an integrated network security design topology.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual course instructors.
History of Changes
C&I 9/10/02, BOT 9/24/02, Effective 20021.
C&I 10/24/06, BOT 11/21/06, DELETE effective 20062(0375)
Reinstated: C&I 11/10/08, BOT 12/16/08, Effective 0415 20091.
C&I 1/27/09, BOT 3/17/09, Effective 20082(0405).
C&I 9/16/2011, BOT 10/2011, Effective 20112(0450).
C&I Approval: 05/16/2014, BOT Approval: 10/21/2014, Effective Term: Spring 2015 (495).
C&I Approval: 02/21/2020, BOT Approval: 03/17/2020, Effective Term: Fall 2020 (580).
C&I Approval: , BOT Approval: , Effective Term: Spring 2021 (585)
Related Programs
- Cisco Certified Network Associate (CCNA-CT) (580) (Active)
- Networking Technologies (COMPNET-AS) (640) (Active)
- Technology Development & Management (TMGT-TR) (670) (Active)
