Syllabus for CYB-520

NETWORK DEFENSE AND SECURITY


COURSE DESCRIPTION

Network Defense and Security offers in-depth coverage of secure network design concepts, intrusion detection and prevention systems, network monitoring and mapping tools, web filtering, packet filtering, and advanced malware protection. Proactive methodologies for assessing and analyzing both host-based and network-based vulnerabilities are examined. Appropriate network defense measures and technologies are identified and evaluated. The course also examines the nomenclature of mobile and wireless networks and security of mobile systems and devices.

COURSE TOPICS

COURSE OBJECTIVES

After completing this course, students should be able to:

CO 1        Analyze the network defense in depth security.

CO 2        Design and implement intrusion detection and prevention systems.

CO 3        Configure network monitoring and mapping tools.

CO 4        Design and implement web filtering, packet filtering, and advanced malware protection measures.

CO 5        Design proactive vulnerability assessment systems.

CO 6        Analyze forensic investigation procedures.

CO 7   Assess mobile and wireless network security vulnerabilities.

COURSE MATERIALS

You will need the following materials to complete your coursework. Some course materials may be free, open source, or available from other providers. You can access free or open-source materials by clicking the links provided below or in the module details documents. To purchase course materials, please visit the University's textbook supplier.

Required Textbook

ISBN 13: 978-0789759962

Required Labs

COURSE STRUCTURE

Network Defense and Security is a three-credit online course consisting of eight modules. Modules include an overview, topics, learning objectives, study materials, and activities. Module titles are listed below.

ASSESSMENT METHODS

For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, work on Infosec Learning labs, and complete course reflection activities and a final project. See below for details.

Consult the Course Calendar for due dates.

Promoting Originality

One or more of your course activities may utilize a tool designed to promote original work and evaluate your submissions for plagiarism. More information about this tool is available in SafeAssign.

Discussion Forums

You are required to complete six discussion forums. The discussion forums are on a variety of topics associated with the course modules.

Communication with your mentor and among fellow students is a critical component of online learning. Participation in online class discussions involves two distinct activities: an initial response to a discussion question and at least two subsequent comments on classmates' responses.

All of these responses must be substantial. Meaningful participation is relevant to the content, adds value, and advances the discussion. Comments such as "I agree" and "ditto" are not considered value-adding participation. Therefore, when you agree or disagree with a classmate or your mentor, state and support your position.

You will be evaluated on the quality and quantity of your participation, including your use of relevant course information to support your point of view and your awareness of and responses to the postings of your classmates. Remember, these are discussions: responses and comments should be properly proofread and edited, mature, and respectful.

Written Assignments

You are required to complete four written assignments. The written assignments are on a variety of topics associated with the course modules.

Infosec Learning Labs

You are required to complete eight Infosec Learning Labs. Each lab is either 90 minutes or 120 minutes in duration, regulated by a timer. They are designed to be completed in one sitting to simulate a real experience, so you cannot save your progress to return later. For an optimal experience, use a Chrome web browser with an Internet connection to run the labs.

While working through each lab, keep in mind you will need to answer several questions at the end of each lab, including writing a reflection that describes your overall impressions and experience of completing the lab. You will also need to submit a screenshot toward the end of your lab with a timestamp and your name. Submit both the screenshot and your lab reflection results to your mentor using the appropriate “Infosec Lab Results” link in Moodle.

Go to the Infosec Learning Labs area of the course website for further details about completing and submitting lab assignments.

Final Project

For the final project, you are required to write a system security plan (SSP) paper for a fictitious organization. You will apply your knowledge and skills learned in this course to develop a comprehensive SSP to protect the enterprise network for the organization. Your plan should cover the enterprise security from perimeter protection, internal network, and user applications to mobile applications. Go to the Final Project area of the course website for further details.

Course Reflection

For this course—and throughout the Master of Science in Cybersecurity (MSCYB) program—you will complete a course reflection, which includes collecting digital artifacts, participating in course reflection discussion forums, and writing a course reflection essay. Reference the Course Reflection area of the course website for full requirements and instructions.

GRADING AND EVALUATION

Your grade in the course will be determined as follows:

All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:

A

=

93–100

B

=

83–87

A–

=

90–92

C

=

73–82

B+

=

88–89

F

=

Below 73

To receive credit for the course, you must earn a letter grade of C or higher on the weighted average of all assigned course work (e.g., assignments, discussion postings, projects). Graduate students must maintain a B average overall to remain in good academic standing.

STRATEGIES FOR SUCCESS

First Steps to Success

To succeed in this course, take the following first steps:

Study Tips

Consider the following study tips for success:

ACADEMIC POLICIES

To ensure success in all your academic endeavors and coursework at Thomas Edison State University, familiarize yourself with all administrative and academic policies including those related to academic integrity, course late submissions, course extensions, and grading policies.

For more, see:

Copyright © 2020 by Thomas Edison State University. All rights reserved.