MIS 324-002 Network Security

Syllabus - Spring 2024

Required Text

CompTIA Security+ Review Guide:
Exam SY0-601, 5th Edition
(available via Percipio)

 

Course Description

Prerequisite: MIS 320 or MIS 323 or CSC 344 (min C-).
Provide students with knowledge of the concepts used in defending a network, and the basic tools and techniques that can be taken to protect a network and communication assets from cyber threats. Provide students with the knowledge to administer and maintain a comprehensive enterprise security infrastructure. Provide students with an understanding of common security architectures for the protection of information systems and data.

Schedule (*all times are ET)

Tuesday Topic Thursday Topic
9 January No class 11 January Introduction
1.1 read/watch/quiz/lab [due 16Jan@1400]
16 January 1.1 Compare and Contrast the Different Types of Social Engineering Techniques
1.2 read/watch/quiz/lab [due 18Jan@1400]
18 January 1.2 Given a scenario, analyze potential indicators to determine the type of attack
1.3 read/watch/quiz/lab [due 23Jan@1400]
23 January 1.3 Given a scenario, analyze potential indicators associated with application attacks
1.4 read/watch/quiz/lab [due 25Jan@1400]
25 January 1.4 Given a scenario, analyze potential indicators associated with network attacks
1.5 read/watch/quiz/lab [due 30Jan@1400]
1.6 read/watch/quiz/lab [due 30Jan@1400]
30 January 1.5 Explain different threat actors, vectors, and intelligence sources
1.6 Explain the security concerns associated with various types of vulnerabilities
1.7 read/watch/quiz/lab [due 1Feb@1400]
1.8 read/watch/quiz/lab [due 1Feb@1400]
1 February 1.7 Summarize the techniques used in security assesments
1.8 Explain the techniques used in penetration testing
Domain 1.0 Practice Test [due 2Feb@2359]
2.1 read/watch/quiz/lab [due 6Feb@1400]
6 February 2.1 Explain the importance of security concepts in an enterprise environment
2.2 read/watch/quiz/lab [due 8Feb@1400]
8 February 2.2 Summarize virtualization and cloud computing concepts
2.3 read/watch/quiz/lab [due 13Feb@1400]
2.4 read/watch/quiz/lab [due 13Feb@1400]
13 February 2.3 Summarize secure application development, deployment, and automation concepts
2.4 Summarize authentication and authorization design concepts
2.5 read/watch/quiz/lab [due 15Feb@1400]
15 February 2.5 Given a scenario, implement cybersecurity resilience
2.6 read/watch/quiz/lab [due 20Feb@1400]
2.7 read/watch/quiz/lab [due 20Feb@1400]
20 February 2.6 Explain the security implications of embedded and specialized systems
2.7 Explain the importance of physical security controls
2.8 read/watch/quiz/lab [due 22Feb@1400]
22 February NC-PaCE symposium - no class
2.8 Summarize the basics of cryptographic concepts
Domain 2.0 Practice Test [due 23Feb@2359]
3.1 read/watch/quiz/lab [due 27Feb@1400]
3.2 read/watch/quiz/lab [due 27Feb@1400]
27 February 3.1 Given a scenario, implement secure protocols
3.2 Given a scenario, implement host or application security solutions
3.3 read/watch/quiz/lab [due 14Mar@1400]
29 February TBD
5 March Spring Break - no class 7 March Spring Break - no class
12 March 3.3 Given a scenario, implement secure network designs I
3.3 read/watch/quiz/lab [due 14Mar@1400]
14 March 3.3 Given a scenario, implement secure network designs II
3.4 read/watch/quiz/lab [due 21Mar@1400]
19 March Business Week - no class
Quiz: Business Week Attendance [due 21Mar@2359]
21 March 3.4 Given a scenario, implement secure network designs
3.5 read/watch/quiz/lab [due 26Mar@1400]
26 March 3.5 Given a scenerio, implement a secure mobile solution
3.6 read/watch/quiz/lab [due 2Apr@1400]
3.7 read/watch/quiz/lab [due 2Apr@1400]
28 March Easter - no class
2 April 3.6 Given a scenario, apply cybersecurity solutions to the cloud
3.7 Given a scenario, implement identify and account management controls
3.8 read/watch/quiz/lab [due 4Apr@1400]
3.9 read/watch/quiz/lab [due 4Apr@1400]
4 April 3.8 Given a scenario, implement authentication and authorization solutions
3.9 Given a scenario, implement public key infrastructure
Domain 3.0 Practice Test [due 5Apr@2359]
4.1 read/watch/quiz/lab [due 9Apr@1400]
9 April 4.1 Given a scenario, use the appropriate tool to assess organizational security.
4.2 read/watch/quiz/lab [due 11Apr@1400]
4.3 read/watch/quiz/lab [due 11Apr@1400]
11 April 4.2 Summarize the importance of policies, processes, and procedures for incident response
4.3 Given an incident, utilize appropriate data sources to support an investigation
4.4 read/watch/quiz/lab [due 16Apr@1400]
4.5 read/watch/quiz/lab [due 16Apr@1400]
5.1 read/watch/quiz/lab [due 16Apr@1400]
16 April 4.4 Given an incident, apply mitigation techniques or controls to secure an environment
4.5 Explain the key aspects of digital forensics
5.1 Compare and contrast various types of controls
Domain 4.0 Practice Test [due 17Apr@2359]
5.2 read/watch/quiz/lab [due 18Apr@1400]
5.3 read/watch/quiz/lab [due 18Apr@1400]
18 April WITX - no class
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
5.3 Explain the importance of policies to organizational security
5.4 read/watch/quiz/lab [due 23Apr@1400]
5.5 read/watch/quiz/lab [due 23Apr@1400]
23 April 5.4 Summarize risk management processes and concepts
5.5 Explain privacy and sensitive data concepts in relation to security
Domain 5.0 Practice Test [due 24Apr@2359]
25 April Wrap-up
30 April Reading Day - no class 2 May No class
7 May Final Exam
(1500-1800)
9 May No class

Course Student Learning Outcomes (SLOs)

  1. Describe the key concepts in network defense (defense in depth, minimizing exposure, etc.).
  2. Explain how network defense tools (firewalls, IDS, etc.) are used to defend against attacks and mitigate vulnerabilities.
  3. Analyze how security policies are implemented on systems to protect a network.
  4. Evaluate how network operational procedures relate to network security.
  5. Analyze problems, recommend solutions, products, and technologies to meet business objectives.
  6. Recommend best security practices to achieve stated business objectives based on risk assumptions.
  7. Actively protect information technology assets and infrastructure from external and internal threats.
  8. Monitor systems for anomalies, proper updating, and patching.
  9. Assist in incident responses for any breaches, intrusions, or theft.
  10. Evaluate and perform planning, testing, and implementation of software and hardware deployed.
  11. Examine a specific architecture and identify potential vulnerabilities.
  12. Design a secure architecture for a given application.

Policy Information

Academic Honor Code

As a student at The University of North Carolina Wilmington, I am committed to honesty and truthfulness in academic inquiry and in the pursuit of knowledge. I pledge to uphold and promote the UNCW Student Academic Honor Code.

The University of North Carolina Wilmington is a community of high academic standards where academic integrity is valued. UNCW students are committed to honesty and truthfulness in academic inquiry and in the pursuit of knowledge. This commitment begins when new students matriculate at UNCW, continues as they create work of the highest quality while part of the university community, and endures as a core value throughout their lives.

Please read and be familiar with the UNCW Student Academic Honor Code. I have highlighted some parts that are particularly relevant to courses I teach here.

Academic dishonesty in any form will not be tolerated in this class.

Time Commitment

It is a matter of UNC system policy that you should expect to be committed for an average of 8.5 hours per week (hpw) to this class (or any 3-credit hour class).

A credit hour is defined as one 50-minute meeting of face-to-face instruction per week for 15 weeks, plus a minimum of 2 hours per week for 15 weeks of out-of-class student work.

You should be mentally prepared to spend ~8.5 hpw on this class.

Grading

Grading Scale (+/- at instructor discretion)

A: (avg >= 90)
B: (90 > avg) and (avg >= 80)
C: (80 > avg) and (avg >= 70)
D: (70 > avg) and (avg >= 60)

Coursework Weighting

30% Discussions
30% Tests
10% Videos
10% Papers
20% Final

Late Policy

Discussions will close on the due date and will not generally be re-opened.
Exception: Unexpected life event that derails a reasonable plan to accomplish a discussion by the due time/date; e.g. car accident, illness, family death, etc. Email me if/when this occurs and I will be reasonable.

Extra Credit

Beyond attendance (see below), there is no specified extra credit in this class. I may, on occasion, subjectively award extra credit for assignment solutions that demonstrate meaningful, functional effort beyond the norm.

Attendance

I will offer opportunities to meet both in class and on Zoom. If you think it is to your benefit to attend, please do so. Otherwise, you will not be penalized for non-attendance.

For those who choose to attend and contribute to the class discussion, you will be awarded extra credit up to a maximum of 4 points (4%) on your final grade.

Communication

The best way to contact me is via email. When writing me email, please, indicate your class. Also, be clear/concise: start with your question and then provide supporting details. You do not need to tell me how hard you have been working or how confused you are. Example
If you post questions in the assignment comment section in Canvas, I will likely not see it - do not do that.

Technical Assistance

There are no special technical requirements for CYBR 201. If you have trouble with any UNCW-related infrastructure (e.g., Zoom, OneDrive, Horizon, VPN), you should contact TAC/ITS as they are the managers of these systems.

Student Illness

Students are to do a health check each day before coming to campus. Students who experience COVID-19 symptoms should immediately contact the Abrons Student Health Center at (910) 962-3280. If a student becomes ill, s/he should let the professor know and must not attend the course in-person. If a student is too ill to attend virtually, they will be given the opportunity to complete the material asynchronously.

Disaster Contingency Plan

In the event that UNCW closes, students will be given an assignment to make up for 1 week of missed class time. This will be emailed to students within two days of the UNCW closing announcement. In the event that the rest of the semester is online, students need to be prepared by having reliable internet access, a webcam, and a microphone.

Students with Disabilities

If you are a student with a disability and need accommodations, you must be registered with Disability Services (DePaolo Hall, 910.962.7555). Please provide your Accommodations Letter within the first week of class or as soon as possible. You should then meet with your instructor to make mutually agreed upon arrangements based upon the recommendations in the Accommodations Letter. For additional information, please see UNCW Disability.

Title IX

UNCW takes all forms of interpersonal violence very seriously. When students disclose, first- or third-hand, to faculty or staff about sexual misconduct, domestic violence, dating violence and/or stalking, this information must be reported to the administration in order to ensure that students' rights are protected, appropriate resources are offered, and the need for further investigation is explored to maintain campus safety. There are three confidential resources who do not need to report interpersonal violence: UNCW CARE, the Student Health Center, and the Counseling Center. If you want to speak to someone in confidence, these resources are available, including CARE's 24-hour crisis line (910-512-4821). For more information, please visit CARE

Code of Student Conduct

This course is subject to the Code of Student Life of the University of North Carolina Wilmington (the Code). The full Code is found here Code of Student Life. UNCW practices zero tolerance for violence and harassment of any kind. For emergencies, contact UNCW CARE at 910.962.2273 or Campus Police at 910.962.3184. For University or community resources visit Emergency & Safety Resources.

Religious Observance Policy

In accordance with NC SL 2010-211, students are entitled to two excused absences for religious observances per academic year. These absences must be requested using the form provided on SeaNet, under "Student Services." These requests must be submitted by the student prior to the absence. Once the request is submitted, an email will be sent to all impacted instructors automatically. There is no need to send additional notification to instructors or the Registrar's Office. Any absence for religious purposes will be considered unexcused unless the appropriate form is submitted.

Seahawk Respect Compact

In the pursuit of excellence, UNC Wilmington actively fosters, encourages, and promotes inclusiveness, mutual respect, acceptance, and open-mindedness among students, faculty, staff and the broader community.

Therefore, we expect members of the campus community to honor these principles as fundamental to our ongoing efforts to increase access to and inclusion in a community that nurtures learning and growth for all.