Security in Computing Syllabus
| Unit | Details |
| I |
Information Security Overview: The Importance of Information Protection, The Evolution of Information Security, Justifying Security Investment, Security Methodology, How to Build a Security Program, The Impossible Job, The Weakest Link, Strategy and Tactics, Business Processes vs. Technical Controls. Risk Analysis: Threat Definition, Types of Attacks, Risk Analysis. Secure Design Principles: The CIA Triad and Other Models, Defense Models, Zones of Trust, Best Practices for Network Defense. |
| II |
Authentication and Authorization: Authentication, Authorization Encryption: A Brief History of Encryption, Symmetric-Key Cryptography, Public Key Cryptography, Public Key Infrastructure. Storage Security: Storage Security Evolution, Modern Storage Security, Risk Remediation, Best Practices. Database Security: General Database Security Concepts, Understanding Database Security Layers, Understanding Database-Level Security, Using Application Security, Database Backup and Recovery, Keeping Your Servers Up to Date, Database Auditing and Monitoring. |
| III |
Secure Network Design: Introduction to Secure Network Design, Performance, Availability, Security. Network Device Security: Switch and Router Basics, Network Hardening. Firewalls: Overview, The Evolution of Firewalls, Core Firewall Functions, Additional Firewall Capabilities, Firewall Design. Wireless Network Security: Radio Frequency Security Basics, Data-Link Layer Wireless Security Features, Flaws, and Threats, Wireless Vulnerabilities and Mitigations, Wireless Network Hardening Practices and Recommendations, Wireless Intrusion Detection and Prevention, Wireless Network Positioning and Secure Gateways. |
| IV |
Intrusion Detection and Prevention Systems: IDS Concepts, IDS Types and Detection Models, IDS Features, IDS Deployment Considerations, Security Information and Event Management (SIEM). Voice over IP (VoIP) and PBX Security: Background, VoIP Components, VoIP Vulnerabilities and Countermeasures, PBX, TEM: Telecom Expense Management. Operating System Security Models: Operating System Models, Classic Security Models, Reference Monitor, Trustworthy Computing, International Standards for Operating System Security. |
| V |
Virtual Machines and Cloud Computing: Virtual Machines, Cloud Computing. Secure Application Design: Secure Development Lifecycle, Application Security Practices, Web Application Security, Client Application Security, Remote Administration Security. Physical Security: Classification of Assets, Physical Vulnerability Assessment, Choosing Site Location for Security, Securing Assets: Locks and Entry Controls, Physical Intrusion Detection. |
Security in Computing Practicals
| Practical No | Details |
| 1 | Configure Routers |
| a | OSPF MD5 authentication. |
| b | NTP. |
| c | to log messages to the syslog server. |
| d | to support SSH connections. |
| 2 | Configure AAA Authentication |
| a | Configure a local user account on Router and configure authenticate on the console and vty lines using local AAA |
| b | Verify local AAA authentication from the Router console and the PC-A client |
| 3 | Configuring Extended ACLs |
| a | Configure, Apply and Verify an Extended Numbered ACL |
| 4 | Configure IP ACLs to Mitigate Attacks and IPV6 ACLs |
| a | Verify connectivity among devices before firewall configuration. |
| b | Use ACLs to ensure remote access to the routers is available only from management station PC-C. |
| c | Configure ACLs on to mitigate attacks. |
| d | Configuring IPv6 ACLs |
| 5 | Configuring a Zone-Based Policy Firewall |
| 6 | Configure IOS Intrusion Prevention System (IPS) Using the CLI |
| a | Enable IOS IPS. |
| b | Modify an IPS signature. |
| 7 | Layer 2 Security |
| a | Assign the Central switch as the root bridge. |
| b | Secure spanning-tree parameters to prevent STP manipulation attacks. |
| c | Enable port security to prevent CAM table overflow attacks. |
| 8 | Layer 2 VLAN Security |
| 9 | Configure and Verify a Site-to-Site IPsec VPN Using CLI |
| 10 | Configuring ASA Basic Settings and Firewall Using CLI |
| a | Configure basic ASA settings and interface security levels using CLI |
| b | Configure routing, address translation, and inspection policy using CLI |
| c | Configure DHCP, AAA, and SSH |
| d | Configure a DMZ, Static NAT, and ACLs |
Security in Computing Reference Books
| Title | The Complete Reference: Information Security |
| Authors | Mark Rhodes-Ousley |
| Publisher | McGraw-Hill |
| Edition | 2nd |
| Year | 2013 |
| Download Here | |
| Title | Essential Cybersecurity Science |
| Authors | Josiah Dykstra |
| Publisher | O’Reilly |
| Edition | 5th |
| Year | 2017 |
| Download Here | |
| Title | Principles of Computer Security: CompTIA Security+ and Beyond |
| Authors | Wm.Arthur Conklin, Greg White |
| Publisher | McGraw Hill |
| Edition | 2nd |
| Year | 2010 |
| Download Here | |