Computer Network Security
Computer
Network
Security
MinnesotaStateCommunityand
Technical College
DetroitLakesCampus
Overview
Overview
• Philoso
p
h
y
py
• Noteon2yearColleges
• Certifications
• ProgramCourses
• CCDC
• ProgramNumbers
• Faculty
F
•
F
uture
• Questions
Philosophy
Philosophy
•
You cannot defend what you do not
You
cannot
defend
what
you
do
not
understand.
• Theprogramisdesignedtotrainstudentsto
k i lljb
wor
k
i
nentry
l
eve
l
j
o
b
s
– Networksecurity
–
Networkadministration
Philosophy (cont
’
d)
Philosophy
(cont d)
•
Program is based in skills students need to be
Program
is
based
in
skills
students
need
to
be
employed.
• AdvisoryCommitteeofSecurityandNetwork
Ad i i l d
Ad
m
i
n
i
stratorsmeetyear
l
ytoup
d
ate
curriculum
Note on 2 Year Colleges
Note
on
2
Year
Colleges
•
Students care about real world experience
Students
care
about
real
world
experience
dii fdlijbkill
• E
d
ucat
i
on
i
s
f
ocuse
d
on
l
earn
i
nga
j
o
b
s
kill
• Vitalfortechnicalfacultytostaycurrentinthe
fieldtomaintaincredibilit
y
y
Certifications
Certifications
•
Microsoft
•
CompTIA
Microsoft
– MCP
– MCSA
CompTIA
– Security+
– Linux+
– MCSE – Server+
– Network+
• Planet3
– CWNA
• Cisco
–
CCNA
Program Overview
Program
Overview
•
Associates of Applied Science (71 credits)
Associates
of
Applied
Science
(71
credits)
lf f h d i k dii i
• Ha
lf
o
f
t
h
e
d
egree
i
snetwor
k
a
d
m
i
n
i
str at
i
on
• Halfof thedegreeissecurityadministration
Program Objectives
Program
Objectives
• Designandmaintainsecurecomputernetworks
• Recognizesecuritybreachesandimplement
countermeasures
•
Develop a disaster recovery plan
•
Develop
a
disaster
recovery
plan
• Demonstrateprofessionalcommunicationskillsin
relationtocomputernetworking
• Demonstrateethicalskillsinrelationtocomputer
security
•
Evaluate current practices and recommend security
Evaluate
current
practices
and
recommend
security
measures
• Demonstrateneedforpolicyinimplementationof
security
security
General Education
General
Education
• GSWS1102 • PSYC1200General
ContemporaryCareer
Search
Psychology
• SPCH1114Introto
bl k
• INTD1104Systems
Administration
•
ENGL 1101 College
Pu
bl
icSpea
k
ing
• MNTransferElectives(2
classes)
•
ENGL
1101
College
WritingI
• PHIL1201Ethics
classes)
• CPTR1104Introto
Com
p
uterTech
• CSEC1102Careersin
InformationSystems
p
• MATH0090
IntroductoryAlgebra
Networking Courses
Networking
Courses
• CPTR11
08
Ci
sco
1 • C
S
EC22
0
2Intr
oduc
ti
o
n
08
sco
• CPTR2224LinuxI
• INTD1104 S
y
stems
S 0
oduc o
toWirelessNetworking
• CSEC2204 Managing
y
Administration
• CPTR1118 Cisco2
DirectoryServices
• CSEC2216 Advanced
Rti
• CPTR2272 Network
OperatingSystems
R
ou
ti
ng
• CSEC2218 Disaster
Recovery
Recovery
• CPTR2282 E‐Mail
Administration
Security Courses
Security
Courses
•
CSEC 1110
•
CSEC 2222 Network
CSEC
1110
FundamentalsofIT
Security
CSEC
2222
Network
SecurityDesign
• CSEC2228Network
• CSEC2210Security
Breaches&
Defense
• CSEC2230Com
p
uter
Countermeasures
• CSEC2212WebSecurity
p
Forensics
Studentsarerequiredtosignastatementofethics
CSEC1110 Fundamentals of IT Security
CSEC1110
Fundamentals
of
IT
Security
• CourseObjectives:
Id tif th t f If ti St Sit(INFOSEC)
–
Id
en
tif
y
th
ecomponen
t
so
f
I
n
f
orma
ti
on
S
ys
t
ems
S
ecur
it
y
(INFOSEC)
– ExplainOperationsSecurity(OPSEC)
– DiscussthecomponentsofInformationSecurity
– EmploytheelementsofInformationSystemsSecurity(INFOSEC)
– Formulatesecuritypoliciesandguidancedocuments
–
Interpret legal issues within Information Security
Interpret
legal
issues
within
Information
Security
– Applytheconceptsofriskassessment
– Analyzetheconceptsofsystemlifecyclemanagement
Dttth t f tt
–
D
emons
t
ra
t
e
th
econcep
t
o
f
t
rus
t
– Employthemodesofcomputeroperation
– Analyzetherolesofvariousorganizationalpersonnel
– ApplythefacetsofInformationSecurity
CSEC1110FundamentalsofITSecurity
(’d)
(
cont
’d)
•
Book:
Book:
– Security+GuidetoNetworkSecurity
FundamentalsSecondEdition
–
Course
Technology;CSSIALabManual
• CourseActivities:
–
Studentsusesomebasictoolstogetanov erview
ofsecurity
•
MBSA
Wireshark
IPSorcery
EBCD
Snadboy
•
MBSA
;
Wireshark
;
IPSorcery
;
EBCD
;
Snadboy
Revolution;CainandAble
–
Writeweekl
y
p
a
p
ersonsecurit
y
vulnerabilities
y pp y
CSEC2210SecurityBreaches&
Countermeasures
• Objectives:
Dibth t t d lbilitif t
–
D
escr
ib
e
th
rea
t
s
t
oan
d
vu
l
nera
biliti
eso
f
sys
t
ems
– Performriskmanagementfunctions
– Planasecurityassessmentusingcurrentpractices
–
Perform a security assessment using current practices
–
Perform
a
security
assessment
using
current
practices
– Utilizecurrenttoolstoassessnetworksecurity
– Conductapenetrat iontestusingcurrentpractices
–
Em
p
lo
y
informationreconnaissancetechni
q
ues
py q
– ConductanITauditusingcurrentbestpractices
– Implementcountermeasuresfornetworks
– Completewrittendocumentationofthreats
– Evaluatemethodsofnon‐networkmethodstogainnetworkaccess
– Analyzemethodsattack ersavoiddetection
– Conductattacksonacontrollednetwork
h
–
Demonstrateet
h
ics
CSEC2210SecurityBreaches&
(’d)
Countermeasures
(
cont
’d)
• Books:
– AssessingNetworkSecurity‐ MicrosoftPress(nolongerin
print);NetworkSecurityAssessment‐ O’Reilly;Microsoft
VBSCRIPTStepbyStep– MicrosoftPress;CSSIALabManual
C Aiii
•
C
ourse
A
ct
i
v
i
t
i
es:
– 3weeksonVBScript
– 10weekson
• PenetrationTesting
• Information gathering
• Reportgener ation
•
Hacking techniques
•
Hacking
techniques
• Defensivemeasures
– 2weeksoncapturetheflag
CSEC2212
Web Security
CSEC2212
Web
Security
• Objectives:
Itit t b th li
–
I
nves
ti
ga
t
ecurren
t
we
b
t
ec
h
no
l
og
i
es
– Applycurrentwebbrowsersecuritybestpractices
– Createwebsitevirtualserversanddirectories
M b fld
–
M
anagewe
b
f
o
ld
ers
– ImplementsecurewebcommunicationswithSSL
– Troubleshootwebclientconnectivity
Il tff ti li
–
I
mp
l
emen
t
e
ff
ec
ti
ve
l
ogg
i
ng
– Employwebsiteauthentication
– ImplementFTPservertocurrentstandards
Al b i Ah b
–
A
pp
l
ycurrent
b
estpract
i
cestosecurean
A
pac
h
ewe
b
server
– ApplycurrentbestpracticestosecureanIISserver
– InstallIISfollowingcurrentbestpractices
IllAh b fll i b i
–
I
nsta
ll
A
pac
h
ewe
b
server
f
o
ll
ow
i
ngcurrent
b
estpract
i
ces
CSEC2212
Web Security (cont
’
d)
CSEC2212
Web
Security
(cont d)
• Books:
– ApacheSecurity‐ O’Reilly;MicrosoftIIS6.0
Administrator’sPock etConsultant‐ Microsoft
Press; Apache Phrasebook
O
’
Reilly
Press;
Apache
Phrasebook
‐
O Reilly
• CourseActivities:
–
Studentss
p
end7weeksonsecurin
g
A
p
ache
p g p
– Studentsspend7weeksonsecuringIIS
– Certificates/SSL
–
Directory security
–
Directory
security
– Browsersecurity
– SecuringFTP
CSEC 2228 Network Defense
CSEC
2228
Network
Defense
• Objectives:
–
Outline physical security measures to current best practices
Outline
physical
security
measures
to
current
best
practices
– Identifypersonnelsecuritypracticesandprocedures
– Explainsoftwaresecuritybestpractices
l k
–
Out
l
inenetwor
k
security
– Describeadministrativesecurityproceduralcontrols
– Definecryptosecurity
– Indicateproperkeymanagementprocedures
– Interprettransmissionsecuritymodels
–
Name the elements of TEMPEST security
Name
the
elements
of
TEMPEST
security
– Completefirewallplanninganddesigntocurrentbestpractices
– Distinguishfirewallcryptographystrategies
C k fil i fi ll
–
C
onstructapac
k
et
fil
ter
i
ng
fi
rewa
ll
CSEC 2228 Network Defense (cont
’
d)
CSEC
2228
Network
Defense
(cont d)
• Books:
– GuidetoFirewallsandNetworkSecurityIntrusion
DetectionandVPNs‐CourseTechnology;Managing
Security with Snort and IDS Tools
‐
O
’
Reilly
Security
with
Snort
and
IDS
Tools
O Reilly
• CourseActivities:
– Learnproperdesignofnetworkdefenses
– WorkwithCiscoPIX
– Buildandconfigur eaSnortsystem
Il tPi
–
I
mp
l
emen
t
P
rox
i
es
– Workwithvariouspersonalfirewalls
–
Com
p
leteawritten
p
ro
p
osaland
p
resentationonfirewalls
p pp p
CSEC 2230 Computer Forensics
CSEC
2230
Computer
Forensics
• Objectives:
Examine computer forensics as a profession
–
Examine
computer
forensics
as
a
profession
– Explainthestepsinacomputerinvestigation
– Evaluatecurrentcomputerforensictools
Employ proper procedures fin processing crime and incident scenes
–
Employ
proper
procedures
fin
processing
crime
and
incident
scenes
– Applydigitalevidencecontrols
– Selectthebestdataacquisitionmethodsforeachinvestigation.
Describe computer forensics analysis
–
Describe
computer
forensics
analysis
– Demonstrateprocedurestorecoverimagefiles
– Employstandardprocedurestoperformnetworkforensics
Use specialized e
mail computer forensics tools
–
Use
specialized
e
‐
mail
computer
forensics
tools
– Formulatereportfindingswithforensicsoftwaretools
– Examinedisksofvariousfilesystems
Dtt
il ititithi
–
D
emons
t
ra
t
epropere‐ma
il
i
nves
ti
ga
ti
on
t
ec
h
n
i
ques
CSEC2230ComputerForensics
(’d)
(
cont
’d)
•
Book:
Book:
– GuidetoComputerForensicsandInvestigations
3
rd
Edition‐ CourseTechnology
• CourseActivities:
–
StudentsuseWindowstools:
• FTK,WinHex,ProDiscover,Helix
– StudentslearntouseLinuxtools:
• Autopsy, Sleuth,dd,Fubuntu
– Requiredtowriteareportonstartingupa
forensic lab
forensic
lab
.
CSEC 2222 Network Security Design
CSEC
2222
Network
Security
Design
• Objectives:
–
Identifycomponentsofnetworksecurityplanning
– Describecomponentsofsystemslifecyclemanagement
–
Conductanetworkvulnerabilit
y
anal
y
sisusin
g
currentbest
p
ractices
y y g p
– Implementacomputernetwork
– Constructasecurenetworkframework
Implement security countermeasures using current best practices
–
Implement
security
countermeasures
using
current
best
practices
– Demonstrateabilitytosecureanetworkclienttocurrentbest
practices
Dttbilit t tk t t bt
–
D
emons
t
ra
t
ea
bilit
y
t
osecurene
t
wor
k
resources
t
ocurren
t
b
es
t
practices
– Demonstrateabilitytosecurenetworkservertocurrentbestpractices
–
ImplementaDMZ
– Demonstrateethics
CSEC2222NetworkSecurityDesign
(’d)
(
cont
’d)
• Book:
– MCSEGuidetoDesigningSecurityforaMicrosoft
WindowsServer2003Network‐ CourseTechnology
•
Course Activities:
Course
Activities:
– Capstonecourse:studentsmustuseatechnologylearned
ineachclassusedintheireducation
–
5 weeks on secure design
–
5
weeks
on
secure
design
– 6weeksonbuildingandsecuringtheirnetwork
– 4weeksonconductingasecurityassessmentona
different team
’
s network
different
team s
network
– Thebuildingaassessmentphasesrequireawrittenreport
andpresentation
CSEC2222NetworkSecurityDesign
(’d)
(
cont
’d)
• CapstoneProjectRequirementsfor • MinimumSystem Requirements
2008
• ProvidedEquipment
– 3servers
2 lt
– ActiveDirectory
– DNS
– DHCP
Eh 2003
–
2
l
ap
t
op
– 2Cisco2500router
– 1CiscoSwitch
–
1 Cisco 1232 Access Point.
–
E
xc
h
ange
2003
– CiscoWireless
– CiscoRouter
–
C
i
sco
S
wi
tc
h
1
Cisco
1232
Access
Point.
CscoStc
– Wirelessclientmachine
– IIS
– Apache
– FTPsite
CCDC
CCDC
•
Collegiate Cyber Defense Competition
Collegiate
Cyber
Defense
Competition
– 8studentsfromtheprogramontheteameach
year
year
– 2007and2008heldatInverHills CC
–
http://ccdc minnesota edu
–
http://ccdc
.
minnesota
.
edu