Vous êtes sur la page 1sur 5

Other Course Information ITSY 2400 OPERATING SYSTEM SECURITY SUMMER, 2012 Section Number: Room Number: Class

Days/Hours: Instructor: Email: Office: Phone: 5420/9000 INET MTWRFSU, TBA MS. CHRISTINE SCHUBERT-LOGUE cschubert@dcccd.edu A427 (214) 860-2363

El Centro College SCANS Statement Explanation The following table illustrates how the course specific learning outcomes provide mastery of foundation skills and workplace competencies. COURSE OUTCOME Identify network security risks, security design , and monitoring solutions; identify sources of computer threats, evaluate potential practices, tools, and technologies to protect individual network systems; establish and sustain an operating system security plan utilizing systems and application security tools; implement procedures to secure and monitor audit logs and set system administrator alerts; and develop an organizational operating system security plan that provides for periodic reviews of security policies, procedures, authorized users list, and software update patches.
SCANS 3a,3b,3c,4b,4c,4d,5a,5b, Sc,6a,6d,6e,7a7b,7c,7d,7f 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c,7d,7e,7f 3a,3b,3c,4c,4,d,6a,6e,7a,7e, 7d,7c,7b,7f 3a,3b,3c,4b,4c,4d,5a,5b, 5c,6a,6d,6e,7a7b,7c,7d, 7f, 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c,7d,7e,7f 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7f LEARNING OUTCOMES Explain the cost factors related to security Describe the types of attacks on operating systems and networks Discuss typical forms of malicious software and understand how they work Utilize techniques to protect operating systems from malicious software and to recover from an attack Explain and configure IP Security Discuss attacks on encryption and authentication methods Discuss and configure account policies and logon security techniques Discuss and implement global access privileges Utilize shared resource security, using share permissions in Windows 2000/XP/2003 Troubleshoot security Describe how TCP, UDP, and IP work and understand the security vulnerabilities of these protocols EVALUATION Tests, Homework, Labs Tests, Homework, Labs Test, Homework, Labs Tests, Homework, Labs

Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

SCANS 3a,3b,3c,4b,4c,4d,5a,Sb, 5c,6a,6d,6e,7a7b,7c,7d, 71 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c,7d,7e,7f 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7f 3a,3b,3c,4b,4c,4d,5a,5b, 7c,6a,6d,6e,7a7b,7c,7d, 7f 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4c,4,d,6a,6e,7a, 7e,7d,7c,7b,7e,7f 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4b,4c,4d,5a,5b, 5c,6a,6d,6e,7a7b,7c,7d, 7f, 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e 3a,3b,3c,4b,4d,4e,5b,5c, 6a,6e,7a,7b,7c 3a,3b,3c,4b,4c,4d,5b,5c, 6a,6e,7a,7b,7c,7d,7e

LEARNING OUTCOMES Configure the firewall capabilities in operating systems Implement a network topology for security Explain how to use structured network design for security Describe IEEE 802.11 radio wave networking Apply wireless security measures Discuss Internet security using protocols and services Configure Web browsers, remote access services, and virtual private network services for security Describe the use of SMTP in e-mail and attacks on SMTP Discuss general techniques for securing e-mail Deploy UPS systems and RAID Create hardware redundancy and apply faulttolerance Describe the relationship between baselining and hardening Explain intrusion-detection methods Describe how to monitor logged-on users and a network

EVALUATION Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs Tests, Homework, Labs

COMPUTATION OF FINAL GRADE Student progress will be evaluated by the following means:
Lecture Book Quizzes 4 Major Exams Labs- Labsim SSCP Units Domains Practice Certification Exam Discussion/Participation/Attendance Research Paper Total 10% 100% 10% 20% 20% 10% 10% 20% 50% 30% Grade Evaluation: A= 90 - 100 B= 89 - 80 C= 79 - 70 D= 69 - 60 F= 59 or below

LATEWORK No late work will be accepted!!! MAKE-UPS There will be no make-up test unless previously arranged with the instructor. INCOMPLETE GRADE STATEMENT Incomplete grades are given only in case of an emergency and at least 50% of the course requirements must have been completed. Request for an incomplete grade must be justified through a written statement and presented to your instructor who will decide if your request can be approved.
CONTINUING EDUCATION STUDENTS MUST COMPLETE ALL PROJECTS AND TESTS IN ORDER TO RECEIVE A CEU AWARD.

COURSE OUTLINE The instructor may alter this course outline at any time due to time constraints, loss of school days, or unforeseen problems with computer equipment, labs, etc. Assignments due each week by Sunday night at 11:00 pm. ITSY 2400 OPERATING SYSTEMS SECURITY SUMMER, 2012 Week 1 Date 6/06-6/10 Labs-LabSim 1.0 Access Control Lecture Book Assignments Chapter Quiz Chapter-Lecture Book 1. Windows and the Threat Landscape. 2. Security in Microsoft Windows OS. 3. Access Controls in Microsoft Windows. 4. Microsoft Windows Encryption Tools and Technologies. 5. Protecting Microsoft Windows Against Malware. 6. Group Policy Controls in Microsoft Windows. 7. Microsoft Windows Security Profile and Audit Tools. 8. Microsoft Windows Backup and Recovery Tools. 9. Microsoft Windows Network Security. 10. Microsoft Windows OS Security Administration. 11. Hardening the Windows OS. 12. Microsoft Application Security. 13. Microsoft Windows Incident handling and Management. 14. Microsoft Windows and The Security Lifecycle Exam 3 take by 7/22 Chapters 7-10 Lecture Book Exams

2 3

6/11-6/17 6/18-6/24

2.0 Cryptography Chapter Quiz 3.0 Networks and Communications Chapter Quiz

Exam 1 take by 7/01 Chapters 1-3

6/25-7/01

4.0 Malicious Code and Attacks

Chapter Quiz

7/02-7/08

5.0 Analysis and Monitoring 6.0 Risk, Response, and Recovery 7.0 Operations and Administration Practice ExamsDomain All

Chapter Quiz

Exam 2 take by 7/15 Chapters 4-6

7/09-7/15

Chapter Quiz

7/16-7/22

Chapter Quiz

7/23-7/29

Practice ExamsDomain All

Chapter Quiz

Week 9

Date 730-8/05

Labs-LabSim Practice ExamsDomain All

Lecture Book Assignments Chapter Quiz

Chapter-Lecture Book 15. Best Practices for Microsoft Windows and Application Security. Presentation of Group Case Study

Lecture Book Exams

10

8/06-8/09

Certification Practice Exam

Exam 4 take by 8/09 Chapters 1115

COMPUTER CENTER RULES AND HOURS OF OPERATION