CET 2685 - Implementing Cisco Network Security

College of Computer & Information Technology

Credit(s): 3
Contact Hours: 47
Effective Term Spring 2021 (585)

Requisites

Prerequisite CET 2615 with a minimum grade of C or
Prerequisite CCNA certification

Learning Outcomes and Objectives

  1. The student will evaluate the need for network security components by:
    1. defining the steps hackers use to build a footprint of a network and compromise devices.
    2. describing the major types of network attacks.
    3. identify the best methods and technologies to mitigate each type of attack.
  2. The students will implement device hardening and AAA services to control administrative access to network infrastructure by:
    1. configuring Secure Shell (SSH) and device hardening on network equipment.
    2. employing event logging and identifying Cisco log severity levels.
    3. describing the functional components of authentication, authorization, and accounting.
    4. identifying the list of methods the AAA authentication process will query in sequence.
    5. configuring an authentication server to control login and command authorization.
  3. The student will analyze the need for and implement network security devices using IPS by:
    1. describing the primary functions and components of IPS.
    2. configuring IPS to work in an integrated network security design topology.
    3. testing and verifying the operation of IPS in an integrated network security design topology.
  4. The student will implement network security devices within an integrated network security design topology using VPNs by:
    1. describing the primary functions and components of VPNs.
    2. configuring a VPN to work in an integrated network security design topology.
    3. testing and verifying the operation of a VPN in an integrated network security design topology.
    4. describing the primary functions and components of the IPSec encryption protocols.
    5. configuring IPSec between Cisco routers to create a secure communication environment.
  5. The student will implement hardware firewalls within an integrated network security design topology by:
    1. describing the primary functions and components of a hardware firewall.
    2. describing how a firewall examines traffic passing through it and applies various rules to it.
    3. configuring a hardware firewall to work in an integrated network security design topology.
    4. testing and verifying the operation of a hardware firewall in an integrated network security design topology.

Criteria Performance Standard

Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual course instructors.

History of Changes

C&I 9/10/02, BOT 9/24/02, Effective 20021. C&I 10/24/06, BOT 11/21/06, DELETE effective 20062(0375) Reinstated: C&I 11/10/08, BOT 12/16/08, Effective 0415 20091. C&I 1/27/09, BOT 3/17/09, Effective 20082(0405). C&I 9/16/2011, BOT 10/2011, Effective 20112(0450). C&I Approval: 05/16/2014, BOT Approval: 10/21/2014, Effective Term: Spring 2015 (495). C&I Approval: 02/21/2020, BOT Approval: 03/17/2020, Effective Term: Fall 2020 (580).
C&I Approval: , BOT Approval: , Effective Term: Spring 2021 (585)

Related Programs

  1. Cisco Certified Network Associate (CCNA-CT) (580) (Active)
  2. Networking Technologies (COMPNET-AS) (640) (Active)
  3. Technology Development & Management (TMGT-TR) (670) (Active)