Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 NES554: Computer Networks Defense Course Overview.

Similar presentations


Presentation on theme: "1 NES554: Computer Networks Defense Course Overview."— Presentation transcript:

1 1 NES554: Computer Networks Defense Course Overview

2 Instructor’s Information Dr. Basheer Al-Duwairi Location: E1L3 Office Hours: SUN, TUE, THU (10:15 – 11:15) or by appointment Email: basheer@just.edu.jobasheer@just.edu.jo Webpage: http://www.just.edu.jo/~basheerhttp://www.just.edu.jo/~basheer

3 Resources Lecture notes and research papers Textbook: Guide to Network Defense and Countermeasures, 3 rd edition, by Randy Weaver, Dawn Weaver, Dean Farwood, Cengage Learning, 2013, ISBN- 10: 1133727948, ISBN-13: 978-1133727941. Secondary/References: Computer Security: Principles and Practice, 2/E, William Stallings, Lawrence Brown ISBN-10: 0132775069, ISBN-13: 9780132775069, Publisher: Prentice Hall, Copyright: 2012

4 Course Objectives Identify, investigate and analyze threats to network security. Identify the fundamental concepts and practices in network defense. Design, implement and operate effective network defense measures to protect the networks from intrusions. Describe router security controls and create access control lists. Describe the concepts of signature analysis and detect normal and suspicious traffic signatures Identify the components of an intrusion detection and prevention system

5 Course Objectives (Contd.) Describe options for implementing intrusion detection and prevention systems Describe common approaches to packet filtering design packet filtering and firewall rule sets Design and deploy and operate appropriate firewalls. Describe Virtual Private Network (VPN) Concepts. Understand the process involved in IT security management. Outline the process of selecting suitable controls to address risks

6 Topics to be covered Introduction Attacks and Hacker Tools Botnets Network Traffic Signatures Router Security IP Traceback

7 Topics to be covered (Contd.) Intrusion Detection and Prevention Systems Firewalls Virtual Private Networks Security Management and Risk Assessment Security Controls, Plans and Procedures

8 Introduction-Security review Basic security concepts Information Security vs. Infrastructure Security Emerging Security Threats

9 Introduction-Attackers Motivation for us Identification of Them – Skills - Hierarchy – Motives – Notable Individuals and Groups - History Impact of Them on us Resources

10 Attacks and Hacker Tools Reconnaissance Network mapping Port scanning Sniffing IP address spoofing Session hijacking

11 Botnets Botnet formation Botnet Life Time IRC-Based Botnets P2P- Botnets New Trends in Botnet Design Botnet-Based Attacks DDoS Attacks Spam Identity Theft Phishing Click Fraud

12 Network Traffic Signatures Describe the concepts of signature analysis Detect normal and suspicious traffic signatures Identify suspicious events Explain the Common Vulnerabilities and Exposures (CVE) standard

13 Router Security Creating and Using Access Control Lists Use and Rules Standard ACLs Extended ACLs Named ACLs Examining Cisco Router Logging Cisco Authentication and Authorization

14 IP Traceback Probabilistic packet marking Hash-based IP traceback

15 Intrusion Detection & Prevention Goals of an IDPS Common Detection Methodologies Examining IDPS Components Options for IDPSs Securing IDPS Components Developing IDPS Filter Rules Examining Intrusion Detection Step by Step

16 Firewalls Overview of Firewalls Packet Filtering and Firewall Rule Sets Designing Firewall Configurations Examining Proxy Servers Choosing a Bastion Host Network Address Translation

17 VPNs VPN Components Types of VPNs Evaluating Business Needs for VPNs Advantages and Disadvantages of VPNs Examining VPN Design and Architecture

18 Security Management and Risk Assessment IT Security Management Organizational Context and Security Policy Security Risk Assessment Detailed Security Risk Analysis Case Study: Silver Star Mines

19 Security Controls, Plans and Procedures IT Security Management Implementation Security Controls or Safeguards IT Security Plan Implementation of Controls Implementation Follow-up Case Study: Silver Star Mines

20 Grading Policy Two midterm exams 20% each HW assignments 20 % Final exam 40 %


Download ppt "1 NES554: Computer Networks Defense Course Overview."

Similar presentations


Ads by Google