|
Dec 26, 2024
|
|
|
|
NET 207 - Applied Computer Security Lab Credits: 2 Lecture Hours: 0 Lab Hours: 4 Practicum Hours: 0 Work Experience: 0 Course Type: General Concepts learned in IT and Security Fundamentals and other first year courses will be applied in this course. The Applied Computer Security Labs course focuses on building skills in the areas of secure coding, OS and networking, and network administration. Learners will take concepts from previous courses and apply them in an isolated, secure environment. This allows learners to practice skills without fear of mistakes and taking mission critical systems offline. Prerequisite OR Corequisite: NET 182 Competencies
- Reinforce secure coding methodologies
- Rewrite code to harden and secure exposed code
- Demonstrate proper coding techniques when constructing public facing services
- Breakdown code samples and compare to secure code concepts
- Examine operating systems (OS) and networking services for security issues
- Identify configurations to harden the OS from attacks
- Demonstrate how proposed changes to OS configurations make it more secure
- Determine network ports and services that are visible to scanners
- Develop solutions to minimize exposed network services
- Diagram network and OS services
- Design secure networks
- Determine network ports necessary for services for a given network
- Create a network topology map given network requirements
- Construct Access Control Lists (ACLs) to control access on the network
- Setup a firewall and set rules for inbound and outbound traffic
- Configure Intrusion Detection Systems (IDS) rules and software
- Explain zero trust design principles and architecture configuration
- Define Zero Trust
- Differentiate between Trust and Untrust zones
- Identify the benefits of the Zero Trust model
- Explain micro-segmentation and purposes for its use
- Design subnets for network segmentation
- Examine subnetting for IPv4 and IPv6 networks
- Develop network segmentation topologies for IPv4 networks
- Develop network segmentation topologies for IPv6 networks
- Demonstrate uses for segmented topologies for given scenarios
- Evaluate security tools used by industry
- Categorize tools by use case based on given scenarios
- Incorporate proper tools into environments for given scenarios
- Configure and use the proper tool for given scenario
Competencies Revised Date: AY2025
Add to Portfolio (opens a new window)
|
|