Network Management and Security CIT4035 - August 2018
Network Management and Security CIT4035 - August 2018
SYLLABUS OUTLINE
DURATION: 90 Hours
This module aims to provide students with a fundamental knowledge of network management principles
and best practices. The module focuses on network management with emphasis on documentation,
configuration and monitoring. It also highlights a variety of techniques for securing an enterprise
network resources.
August 2018 1
3.0 MODULE CONTENT AND CONTEXT
Content
Network documentation Principles
Network Documentation Techniques and Practices
Naming conventions (nomenclatures)
Node element documentation
Change management procedures
Network documentation tools
Network policies: design and principles
Access
Maintenance
Security
Password
Content
Daily activities of a network Manager
Elements of effective network monitoring and maintenance systems
Common Network Management Services and Resources
◦ SNMP, Bandwidth, Active Directory, Scripting technologies
Network Management Systems and dashboards
◦ Open source and Proprietary network management suites
▪ NMAP, Active Directory in monitoring network activities
▪ Nagios
August 2018 2
Network Diagnostic Tools
Network Baselining
Content
Cloud platforms and services
Virtual Servers
Remote management of virtual machines
Virtualization platforms: VMware ESXi, Hyper –V, Xen, KVM
Data Centre Virtualization products: Bare metal and Hosted
Content
Network vulnerability and Risk Assessment
Network auditing
◦ Audit techniques, Audit process, Audit tools
Web Application auditing
Captive Portal
ACL Rules
VPN
Proxy
August 2018 3
UNIT 5 Network Security Management (2 weeks)
(12 hours: 2 hours lecture, 4 hours tutorial, 6 hours lab)
Upon completion of this Unit, the student should be able to:
5.1 Implement intrusion detection and prevention systems
5.2 Mitigate against common LAN network vulnerabilities
5.3 Evaluate Web security vulnerabilities
5.4 Assess authentication principles on network security
5.5 Apply cryptographic techniques and modes of encryption to protect data
5.6 Apply security techniques to defend wireless networks
Content
Message Authentication
Hashing
Digital Signatures
Web Tracking and attacks
Unauthorized access
o Preventing, detecting, and correcting Unauthorized Access
Encryption
o Public Private Key Encryption, Pretty Good Privacy (PGP)
o Secure Socket Layer (SSL), Internet Protocol Security (IPSec)
o Authenticating Users
Securing Wireless Networks
Best Practice Recommendations
Content
Business Continuity Planning
◦ Controlling disruption, destruction and disaster
◦ Fault tolerance, Redundancy
◦ human resource planning
◦ Hardware planning
◦ Software planning
◦ Backup and recovery
▪ Backup strategies
▪ Types of backup: onsite, offsite, real-time, distributed mirror sites
August 2018 4
▪ Backup options
▪ Backup Problems, Recovery
Network Continuity
4.0 LEARNING AND TEACHING APPROACHES
Lectures to provide coverage of the concepts and generate understanding
Tutorials to provide opportunities for a high level of interaction and discussion of the
concepts
Worksheets and case studies to be done in tutorial sessions, emphasizing problem-solving,
testing and understanding of concepts
Supervised lab exercises to implement concepts taught, develop students’ competence in
design and problem solving
Unsupervised lab exercises to promote independent work and collaboration
August 2018 5
6.0 BREAKDOWN OF HOURS
Lectures 13 Hours
Tutorials 26 Hours
Labs 39 Hours
Assessment 12 hours
Required Text:
Burke, J.R. (Latest Edition). Network Management: Concepts and Practice, A Hands-On
Approach. Pearson
Recommended Texts:
Clemm, A. (2007). Network Management Fundamentals (1st ed.). Indianapolis, IN: Cisco Press.
Murdoch, D. (2016). Blue Team Handbook: Incident Response Edition: A condensed field guide
for the Cyber Security Incident Responder. CreateSpace Independent Publishing Platform.
Subramanian, M (2012). Network Management: Principles and Practices (2nd ed.). Chennai,
India: Prentice Hall.
Shawn Meggoe
Kevin Johnson
…………………………………………………………………………………
August 2018
August 2018 6
9.0 APPROVAL
9.1 PROGRAMME DIRECTOR (PD)
…………………………………………………………………………………..
………………………………………………………………………………….......
August 2018 7