Network Security I - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Network Security I

Description:

In this course we will study a lot of attacks related with ... Host bastion. 2.3. Packet Filtering. 2.4. Proxy Servers. 2.5. Stateful Inspection. Topics ... – PowerPoint PPT presentation

Number of Views:49
Avg rating:3.0/5.0
Slides: 13
Provided by: juancarlos5
Category:

less

Transcript and Presenter's Notes

Title: Network Security I


1
Network Security I
  • M.C. Juan Carlos Olivares Rojas

Course Syllabus jcolivares_at_itesm.edu.mx January,
2009
2
Outline
  • Introduction
  • Topics
  • Evaluation
  • Recommendations
  • References

3
Introduction
  • Actually the network security topics are very
    important for the organizations, because
    interconnectivity is a fundamental activity in
    the computer environments.
  • The principal human activity is communication,
    this is the reason because security in computer
    networks is very important
  • In this course we will study a lot of attacks
    related with information security through
    different points of view.

4
Introduction
  • In this course we will study a lot of attacks
    related with information security through
    different points of view. Also, we will study the
    computer network vulnerabilities and we will
    knows the best practices for management the
    information technologies in the organizations.
  • The course duration is 100 hours It's divided in
    4 modules and 20 activities. All activities are 5
    hours of duration.

5
Topics
  • 1. Cybernetic Attacks
  • 1.1. Introduction to cybernetic attacks
  • 1.2. Malicious code
  • 1.3. Denial of Services
  • 1.4. Social Engineering, scanning and
    information retrieval
  • 1.5. Another kinds of attacks

6
Topics
  • 2. Firewall.
  • 2.1. Firewalls Advantages and Disadvantages
  • 2.2. Host bastion
  • 2.3. Packet Filtering
  • 2.4. Proxy Servers
  • 2.5. Stateful Inspection

7
Topics
  • 3. Computer Networks Vulnerabilities
  • 3.1. Evaluation of Computer Networks
    Vulnerabilities
  • 3.2. Well-Know Tools
  • 3.3. Vulnerabilities Administration
  • 3.4. Vulnerabilities in Open Systems
  • 3.5. Vulnerabilities in Proprietary Systems

8
Topics
  • 4. Secure Architectures
  • 4.1. Perimeter Security and Basic Frontier
  • 4.2. DMZ Architecture (Demilitarized Zone)
  • 4.3. Dual Firewall with DMZ
  • 4.4. Simple Mode and High Availability
  • 4.5. Security Zones

9
Evaluation
  • The grades are obtained with the official
    blackboard course.
  • All the activities exercises and homeworks must
    be delivery the next class by E-mail or CD/DVD.
  • The activities which are not qualifying will be
    considered in the quiz or in the partial project
    report. The activities average will add 10 point
    in one of this especial activities.

10
Recommendations
  • The advisory hours should be Wednesday, Thursday
    and Friday at 9-10 a.m.
  • The advisory should be by E-mail, Instant
    Messenger or by another electronics media
  • E-mail jcolivares_at_itesm.mx
  • MSN juancarlosolivares_at_hotmail.com
  • Skype juancarlosolivares

11
References
  • ISACA. (2007). Preparation Manual for the Exam.
    CISA 2007. ISBN 1933284668
  • Harris, S. CISSP All in one Exam Guide. Third
    Edition. United States McGraw-Hill Osborne
    Media, 2006. ISBN 0072257121.

12
Questions?
Write a Comment
User Comments (0)
About PowerShow.com