CS56 / CSTxxx
Upcoming SlideShare
Loading in...5
×
 

CS56 / CSTxxx

on

  • 275 views

 

Statistics

Views

Total Views
275
Views on SlideShare
275
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

CS56 / CSTxxx CS56 / CSTxxx Document Transcript

  • Suffolk County Community College Computer Science/Information Technology Department Syllabus AREA/DIVISION: Computer Science/Information Technology TITLE: CS56 – Firewalls CATALOG DESCRIPTION: This course provides an in-depth exploration of firewalls, web security, and e- commerce security. Explores firewall concepts, types, topology, and the firewall’s relationship to the TCP/IP protocol. Explores client/server architecture, the web server, HTML, and HTTP in relation to web security. Discusses digital certification, X.509, and Public Key Infrastructure (PKI). I. STATEMENT OF OBJECTIVES Upon successful completion of this course, students will be able to: 1. understand principles of the firewall 2. identify security issues related to web server, HTML, HTTP, and email server. 3. be familiar with digital certification, X.509, and Public Key Infrastructure (PKI) 4. plan and select appropriate firewall protection for a computing environment, 5. configure and implement appropriate rules for firewalls, and 6. evaluate the performance of firewalls. II. RELATIONSHIP TO STUDENTS A. Credits/Contact Hour - 4 B. Required/Elective Required C. Transferability We feel as more schools begin to offer security degrees the transferability of this course will grow. D. Proposed cycle for offering Each semester at Ammerman and Grant beginning with Spring 2005 E. Estimate of student enrollment Spring 2005 enrollment expectation is 20 students at Ammerman and 24 students at Grant. F. Prerequisites - CS28 III. RELATIONSHIP TO FACULTY A. Number of current faculty available to teach proposed course and number of additional faculty required.
  • There are several faculty currently up-to-date with this information. With some training all current faculty are qualified to teach this course. B. Number of other staff positions required. In the beginning, the ETU staff will be sufficient. As the population in the curriculum grows, the technical staff may have a heavier load. The current secretarial staff will be sufficient. C. Discipline(s) required and/or minimum preparation in order to teach the course. Master’s or PHD in Computer Science/Information Technology, ideally with emphasis in Networks and/or Computer Security issues. IV. RELATIONSHIP TO SUNY GENERAL EDUCATION REQUIREMENTS* A. If this is a general education course, how does it incorporate the SUNY infused competencies of critical thinking and information management? N/A B. If this is a general education course, what are its assessment measures, i.e. instruments to measure the attainment of student learning outcomes? N/A V. RELATIONSHIP TO OTHER COLLEGES AND/OR CAREER GOALS A. List other colleges that offer this course. Since this course and the related degree program are new to LI, no colleges in our area offer this course. VI. ADDITIONAL COSTS List additional costs and space requirements that have not already been recorded in the document. VII. COURSE OUTLINE Include electronic course outline following prescribed format from the Faculty Handbook. (See Attachment I) ATTACHMENT I COURSE OUTLINE (see Appendix D of Faculty Handbook for details) CATALOG NUMBER: CS56
  • COURSE TITLE: Firewalls INSTRUCTOR: Open SEMESTER: YEAR: 1. OBJECTIVES OF THE COURSE: (same as above) 2. PROCEDURES FOR ACCOMPLISHING THESE OBJECTIVES: Lectures, board work, power point slides (by faculty choice) Reading assignments Homework assignments In class exercised In class supervised labs Independent projects 3. STUDENT REQUIREMENTS FOR COMPLETION OF THE COURSE: Students are required to attend all classes, complete all assignments, and take all exams. 4. GRADING PRACTICES: Exams 50 % Assignments 10 HW and class participation 10 Final 30 Total 100% 5. RULES CONCERNING STUDENT ABSENCE AND LATENESS: College Wide Attendance Policy: All students are expected to attend every session of each course of which they are registered. Students are responsible for all that transpires in class whether or not they are in attendance. The College defines excessive absence or lateness as more than the equivalent of one week of class meetings during the semester. Excessive absence or lateness may lead to failure in a course or removal from the class roster. 6. TEXTBOOK: - Suggested 1. CISCO technical documentation on PIX 500 series firewalls 2. Microsoft technical documentation on Internet Security and Acceleration (ISA) Server 3. Handouts distributed in class 7. WEEKLY OUTLINE TOPICS TO BE COVERED: 1. Introduction to firewalls, web security, and e-commerce security. 2. Firewall concepts, types, topology, and the firewall’s relationship to the TCP/IP protocol.
  • 3. Client/server architecture, the web server, HTML, and HTTP in relation to web security. 4. Digital certification, X.509, and Public Key Infrastructure (PKI). 5. Understand hardware and software firewalls. 6. Microsoft Internet Security and Acceleration (ISA) Server: technology and features 7. Microsoft Internet Security and Acceleration (ISA) Server: installation 8. Microsoft Internet Security and Acceleration (ISA) Server: configuration and testing. 9. Other software firewall: Check Point. 10. CISCO PIX 500 series firewalls: technology and features. 11. CISCO PIX 500 series firewalls: installation. 12. CISCO PIX 500 series firewalls: configuration and testing. 13. Other hardware firewalls: Linksys, D-link, and SonicWall. 14. Other hardware firewalls: Linksys, D-link, and SonicWall. 15. Review 8. AUDIO-VISUAL MATERIALS TO BE USED: Data Projectors 9. LIST OF SUPPLEMENTAL READINGS: (may be left blank)