0% found this document useful (0 votes)
85 views

Network Management and Security CIT4035 - August 2018

This document outlines a syllabus for a Network Management & Security course. The course is divided into 6 units that cover topics such as network documentation, monitoring, virtualization, firewall administration, security management, and business continuity planning. Students will learn through lectures, tutorials, worksheets, case studies, and supervised and unsupervised lab exercises. Assessment will include a group research assignment worth 15% of the overall grade. The course aims to provide students with fundamental knowledge of network management principles and techniques for securing enterprise networks.

Uploaded by

Jordane Randall
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Network Management and Security CIT4035 - August 2018

This document outlines a syllabus for a Network Management & Security course. The course is divided into 6 units that cover topics such as network documentation, monitoring, virtualization, firewall administration, security management, and business continuity planning. Students will learn through lectures, tutorials, worksheets, case studies, and supervised and unsupervised lab exercises. Assessment will include a group research assignment worth 15% of the overall grade. The course aims to provide students with fundamental knowledge of network management principles and techniques for securing enterprise networks.

Uploaded by

Jordane Randall
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

UNIVERSITY OF TECHNOLOGY, JAMAICA

SYLLABUS OUTLINE

FACULTY: Engineering and Computing

SCHOOL/DEPT: Computing & Information Technology

COURSE OF STUDY: Bachelor of Science in Computing

LEVEL: Four (4)

MODULE TITLE: NETWORK MANAGEMENT & SECURITY

MODULE CODE: CIT4035

DURATION: 90 Hours

CREDIT VALUE: Four (4)

PREREQUISITES: Network Administration & Technical Support (CIT3017)

1.0 MODULE DESCRIPTION

This module aims to provide students with a fundamental knowledge of network management principles
and best practices. The module focuses on network management with emphasis on documentation,
configuration and monitoring. It also highlights a variety of techniques for securing an enterprise
network resources.

2.0 MODULE OBJECTIVES

Upon completion of this module students should:

i. Understand the importance of network documentation and policies


ii. Apply the ISO FCAPS Framework to manage enterprise networks.
iii. Configure virtualized network for security
iv. Implement firewall rules to protect enterprise internal network from attacks
v. Apply security principles to mitigate against common network security vulnerabilities
vi. Implement network Continuity Planning strategies for enterprise networks
vii. Assess backup and recovery strategies

August 2018 1
3.0 MODULE CONTENT AND CONTEXT

UNIT 1 Network Policies and Documentation: Principles and Practices


(12 hours: 2hours lecture, 4 hours tutorial, 6 hours lab)

Upon completion of this Unit, the student should be able to:


1.1 Understand how network policies inform the network documentation process
1.2 Explain the importance of documenting a network
1.3 Outline the steps in network documentation
1.4 Discuss how BYOD affects network management
1.5 Discuss the impact of change management on network documentation in enterprise networks
1.6 Apply an appropriate naming convention for network resources
1.7 Apply various technologies, services, and tools industry utilizes to manage and troubleshoot networks

Content
 Network documentation Principles
 Network Documentation Techniques and Practices
 Naming conventions (nomenclatures)
 Node element documentation
 Change management procedures
 Network documentation tools
 Network policies: design and principles
 Access
 Maintenance
 Security
 Password

UNIT 2 Network Monitoring and Maintenance (2 weeks)


(12 hours: 2 hours lecture, 4 hours tutorial, 6 hours lab)

Upon completion of this Unit, the student should be able to:


2.1 Describe the day-to-day activities involved in managing a network
2.2 Identify the key elements of monitoring and maintaining networks
2.3 Apply best practices in managing Bring Your Own Device (BYOD) in an enterprise
2.4 Apply common network management protocols to troubleshoot common network related issues
2.5 Monitor common services needed for network functionality
2.6 Monitor Server, Bandwidth and wireless network performance and security
2.7 Contrast Simple Network Management Protocol (SNMP) and common network management suites
2.8 Appraise current Open source and Proprietary network management suites

Content
 Daily activities of a network Manager
 Elements of effective network monitoring and maintenance systems
 Common Network Management Services and Resources
◦ SNMP, Bandwidth, Active Directory, Scripting technologies
 Network Management Systems and dashboards
◦ Open source and Proprietary network management suites
▪ NMAP, Active Directory in monitoring network activities
▪ Nagios
August 2018 2
 Network Diagnostic Tools
 Network Baselining

UNIT 3 Network Virtualization and Cloud Computing (2 weeks)


(12 hours: 2 hours lecture, 4 hours tutorial, 6 hours lab)
Upon completion of this Unit, the student should be able to:

3.1 Understand the concept of virtualization


3.2 Describe the different types of Cloud platforms and services
3.3 Differentiate between virtualization and Cloud Computing
3.4 Compare and contrast physical and virtual machines
3.5 Deploy virtual machines from different vendors
3.6 Configure virtual servers for security
3.7 Manage virtual servers remotely

Content
 Cloud platforms and services
 Virtual Servers
 Remote management of virtual machines
 Virtualization platforms: VMware ESXi, Hyper –V, Xen, KVM
 Data Centre Virtualization products: Bare metal and Hosted

UNIT 4 Firewall Administration and Security Auditing (3 weeks)


(18 hours: 3hours lecture, 6 hours tutorial, 9 hours lab)
Upon completion of this Unit, the student should be able to:
4.1 Employ network Auditing techniques and tools to survey system security
4.2 Asses network risks using established assessment processes
4.3 Apply network vulnerability and risk management techniques
4.4 Apply perimeter security methods to networks
4.5 Create Access Control Lists to filter traffic through a firewall
4.6 Implement firewall rules to filter web content
4.7 Configure Dynamic Host Configuration Protocol (DHCP) in a firewall
4.8 Configure Virtual Private Networks using an IPSec tunnel and connecting clients through OpenVPN
4.9 Controlling access to a networking using Captive Portals
4.10 Implement a Proxy Server in a firewall to cache Internet traffic

Content
 Network vulnerability and Risk Assessment
 Network auditing
◦ Audit techniques, Audit process, Audit tools
 Web Application auditing
 Captive Portal
 ACL Rules
 VPN
 Proxy

August 2018 3
UNIT 5 Network Security Management (2 weeks)
(12 hours: 2 hours lecture, 4 hours tutorial, 6 hours lab)
Upon completion of this Unit, the student should be able to:
5.1 Implement intrusion detection and prevention systems
5.2 Mitigate against common LAN network vulnerabilities
5.3 Evaluate Web security vulnerabilities
5.4 Assess authentication principles on network security
5.5 Apply cryptographic techniques and modes of encryption to protect data
5.6 Apply security techniques to defend wireless networks

Content
 Message Authentication
 Hashing
 Digital Signatures
 Web Tracking and attacks
 Unauthorized access
o Preventing, detecting, and correcting Unauthorized Access
 Encryption
o Public Private Key Encryption, Pretty Good Privacy (PGP)
o Secure Socket Layer (SSL), Internet Protocol Security (IPSec)
o Authenticating Users
 Securing Wireless Networks
 Best Practice Recommendations

Unit 6 Business Continuity Planning (2 weeks)


(12 hours: 2 hours lecture, 4 hours tutorial, 6 hours lab)

Upon completion of this Unit, the student should be able to:

6.1 Describe various backup and recovery procedures


6.2 Explain various redundancy techniques
6.3 Apply fault tolerance and redundancy techniques to critical network components
6.4 Implement backup and recovery procedures
6.5 Select appropriate backup options for various business needs
6.6 Design Business Continuity Plan

Content
 Business Continuity Planning
◦ Controlling disruption, destruction and disaster
◦ Fault tolerance, Redundancy
◦ human resource planning
◦ Hardware planning
◦ Software planning
◦ Backup and recovery
▪ Backup strategies
▪ Types of backup: onsite, offsite, real-time, distributed mirror sites

August 2018 4
▪ Backup options
▪ Backup Problems, Recovery
 Network Continuity
4.0 LEARNING AND TEACHING APPROACHES
 Lectures to provide coverage of the concepts and generate understanding
 Tutorials to provide opportunities for a high level of interaction and discussion of the
concepts
 Worksheets and case studies to be done in tutorial sessions, emphasizing problem-solving,
testing and understanding of concepts
 Supervised lab exercises to implement concepts taught, develop students’ competence in
design and problem solving
 Unsupervised lab exercises to promote independent work and collaboration

5.0 ASSESSMENT PROCEDURES


 Research Assignment (Group) 15%
This assignment can cover any unit in the module, it is meant to allow students to explore topical
issues in network management and security. Students should work in groups of 2 – 4 person and
produce and written paper.

 Tutorial Test 1 15%


This is a test designed to assess students’ mastery of the learning outcomes in Units 1 – 3. The
test may include a combination of Scenario/case Based, Multiple Choice questions, and Short-
Answer questions.

 Tutorial Test 2 15%


This is a test designed to assess students’ mastery of the learning outcomes in Units 4 – 6. The
test may include a combination of Scenario/case Based, Multiple Choice questions, and Short-
Answer questions.

 Lab Assessment (Individual) 15%


Lab assignment will be given to test understanding of the units in the course; each lab must be
completed individually by the students. The labs will aid in promoting hands on coverage
though the course and will provide real-world scenarios for students to practice concepts taught
in the lectures/tutorials.

 Lab project (Grouped )


This group project requires students to utilize all the skills acquired in units 1-6 to apply
management and security techniques to local and enterprise networks.

o The artefact – 30%


o Presentation - 10%
Total - 40%

August 2018 5
6.0 BREAKDOWN OF HOURS

Lectures 13 Hours

Tutorials 26 Hours

Labs 39 Hours

Assessment 12 hours

7.0 TEXTBOOKS AND REFERENCES

Required Text:
Burke, J.R. (Latest Edition). Network Management: Concepts and Practice, A Hands-On
Approach. Pearson

Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident


Detection and Response. CA: No Starch Press Inc.

Recommended Texts:
Clemm, A. (2007). Network Management Fundamentals (1st ed.). Indianapolis, IN: Cisco Press.

Murdoch, D. (2016). Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder. CreateSpace Independent Publishing Platform.

Subramanian, M (2012). Network Management: Principles and Practices (2nd ed.). Chennai,
India: Prentice Hall.

8.0 NAME/S OF SYLLABUS WRITER/S OR DEVELOPER/S

Shawn Meggoe

8.1 DATE OF PRESENTATION

8.2 NAME/S OF SYLLABUS REVIEWER/S

Kevin Johnson
…………………………………………………………………………………

8.3 DATE/S OF REVISION

August 2018
August 2018 6
9.0 APPROVAL
9.1 PROGRAMME DIRECTOR (PD)

…………………………………………………………………………………..

9.1.1 SIGNATURE OF PD ……………………………………………….

9.2 COLLEGE/FACULTY CURRICULUM COMMITTEE

………………………………………………………………………………….......

9.2.1 SIGNATURE OF COMMITTEE CHAIR ….....……………………

10.0 ACCEPTANCE BY OFFICE OF CURRICULUM DEVELOPMENT &


EVALUATION (OCDE)
………………………………………………………………………………………….............

10.1 DATE OF ACCEPTANCE BY OCDE ……………………………...........

August 2018 7

You might also like