Sie sind auf Seite 1von 9

UNIVERSITY OF MAKATI

J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department

MELJUN CORTES,MBA,MPA,MSCS

OUTCOMES-BASED TEACHING AND LEARNING PLAN IN NETWORK SECURITY


Course Title
Credit Units

Course Description

Course Intended Learning


Outcomes (CILO)

NETWORK SECURITY
Course Code
COMNET 10
4
Course Pre-/ Co- requisites
COMNET 8
This course introduces the fundamentals of network security, building and administering secure network architectures. It also covers firewalls,
vulnerability scanners, encryption, risk monitoring and assessment tools, digital certificates, authentication and network vulnerabilities.
This course covers the basic concept of Network Security principles in the computer network industry setting. The students will learn the technical
competencies and required techniques in security analysis, defining expectations, identifying network integrity and confidentiality, vulnerability
analysis, countermeasure development, encryption principles and standards, firewall configuration and implementation, security evaluation with
emphasis on the Network industry environment.
After completing this course, students should be able to:
Identify the technical skills and knowledge needed enable fully understand and implement system security and network security controls.
Describe the importance of security in both systems and networks.
Enumerate and discuss the threats and vulnerabilities and its countermeasures
Implement a simulated network and install security controls.
Design a plan in implementing security controls

Midterm Period

Unit 1: Introduction to Network Security


Essential Learning

Week

Content Standards

Declarative Knowledge

Functional Knowledge

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Intended Learning Outcomes

Suggested Teaching/
Learning Activities
Page 1 of 9

Assessment Tasks

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department
Demonstrate
understanding of
security and
different threats and
its weakness

Midterm Period

Introduction to Network
Security
1. Security concepts
2. Threats and
vulnerabilities
3. Hacking
Methodologies

1. Identifying network
security concepts

1. Classify network security


concepts

2. Categorizing threats
and vulnerabilities

2. Differentiate threats and


vulnerabilities and hacking
methodologies

Lecture/Presentation
Question and Answer

Individual
Demonstration
Quiz #1

3. Discussing hacking
methodologies
Unit 2: Network Vulnerabilities
Essential Learning

Week
2-3

Content
Standards
Demonstrate
familiarity with
the different
types of security
attacks

Midterm Period
Week
4 -5

Content
Standards
Demonstrate
understanding of
cryptography
and its
application to
network security

Declarative Knowledge
Network Vulnerabilities
1. System Attacks
2. Social Engineering

Functional Knowledge
1. Analyzing different
system attacks
2. Categorizing social
engineering/informati
on security

Intended Learning Outcomes


1. Describe the different
system/ network attacks

Suggested Teaching/
Learning Activities

Assessment Tasks

Gapped Lecture
Action Learning

Essay Question
Quiz#2

Suggested Teaching/
Learning Activities

Assessment Tasks

2. Identify the different social


engineering referring to
information security

Unit 3: Cryptography
Essential Learning
Declarative Knowledge

Functional Knowledge

Intended Learning Outcomes

Differentiating
cryptographic methods

Examine cryptographic methods

Cryptography
1. Cryptographic methods
2. Cryptographic attack
3. Logon Security

Compare cryptographic attacks


Analyzing cryptographic
attacks

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Lecture/video presentation
Laboratory Activity
Quiz#3

CONFIGURE USER
ACCOUNT SECURITY
Laboratory Activity
Quiz#3

Illustrate logon security


Page 2 of 9

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department

Midterm Period
Week

6-7

Content
Standards
Demonstrate
understanding of
what is PKI and
how it is being
conducted/work

Designing logon security


Unit 4: Public Key Infrastructure
Essential Learning
Declarative Knowledge
Public Key Infrastructure
1. PKI Concepts
2. Managing
Certificates

Functional Knowledge

Intended Learning Outcomes

Identifying PKI concepts

Name the PKI concepts

Analyzing managing
certificates

Categorize the managing


certificates

Suggested Teaching/
Learning Activities
Lecture
Laboratory Simulation and
Demonstration

Assessment Tasks
Research Output

Managing Security Certificate


Activity
Midterm Period
Week

Content
Standards
Demonstrate
knowledge of
enumerating
criteria for
password
authentications

9
Final Term Period
Week

Content
Standards

Unit 5: Authentication
Essential Learning
Declarative Knowledge
1. Authentication

Account and User


Authentication
Password and User
Authentication

Functional Knowledge

Intended Learning Outcomes

Identifying Account and


user authentication

Explain the account and user


authentication

Identifying password and


user authentication

Discuss the password and user


authentication

Suggested Teaching/
Learning Activities
Gapped Lecture
Lecture- demonstration

Assessment Tasks
Laboratory Activity
Configure Ntlm
Authentication

MIDTERM EXAMINATION WEEK


Unit 6: Network Infrastructure Security
Essential Learning
Declarative Knowledge

Functional Knowledge

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Intended Learning Outcomes

Suggested Teaching/
Learning Activities
Page 3 of 9

Assessment Tasks

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department

10

Demonstrate
understanding in
Network
Infrastructure
Security

Network Infrastructure
Security
1. Network Components
2. Network Address
Translation(NAT)
3. Firewalls
4. Packet Filters
5. Virtual LANs (VLANs)
6.Media Security

Naming the network


components, NAT,
firewalls, Packet filters,
virtual LANs (VLAN) and
media security

Identification of the following:


Network components
NAT
Firewalls
Packet filters
VLANs
Media security

Network Address
Translation

Video Presentation
Laboratory Simulation and
Demonstration

CONFIGURING ACCESS
LIST
CREATED VLAN

Laboratory Activities

Final Term Period

Unit 7: Network and Application Hardening


Essential Learning

Week

Content Standards

Declarative Knowledge

Functional Knowledge

Intended Learning Outcomes

Network and Application


Hardening

Explaining hardening
concepts, network
hardening, operating
system hardening,
protecting files (Microsoft)

Discuss hardening concepts,


network hardening, operating
system hardening, protecting
files (Microsoft)

11

Demonstrate
Understanding in
network and
application
hardening

1. Hardening
Concepts
2. Network
Hardening
3. Operating
System
Hardening
4. Protecting Files
(Microsoft)

Lecture

Suggested Teaching/
Learning Activities
Lecture
Laboratory Simulation and
Demonstration
Assignment

Illustrating NTFS
permission, ownership,
right and privileges

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Assessment Tasks
CONFIGURE NTFS
PERMISSIONS
MODIFY FILE SYSTEM
RIGHTS
Quiz#5

Page 4 of 9

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department
Final Term Period

Unit 8: Auditing and Intrusion Detection


Essential Learning

Week

Content Standards

Declarative Knowledge

12

Demonstrate
knowledge of
auditing and
intrusion detection

Functional Knowledge

Intended Learning Outcomes

Identifying auditing and


Intrusion detection

Classify auditing and intrusion


detection

Unit 9: Communication Security


Essential Learning

Week

Declarative Knowledge

13

Demonstrate
competence in
communication
security

Assessment Tasks
MANAGING SECURITY
LOGS
Laboratory Activities

Final Term Period


Content Standards

Suggested Teaching/
Learning Activities
Presentation
Laboratory Simulation and
Demonstration

1. Remote Access
2. Internet
Communication
3. Virtual Private
Networking
4. Wireless Security

Functional Knowledge

Intended Learning Outcomes

Identifying remote access,


internet communication

Differentiate remote access in


network and internet
communication

Discussing Virtual Private


Network
And wireless security

Suggested Teaching/
Learning Activities
Interactive Lecturing
Virtual Environment

Explain the concept of Virtual


private network and wireless
security

Assessment Tasks
Laboratory Activity
CONFIGURING POLICIES
Virtual Private
CONFIGURING IP SEC
CONFIGURING WIRELESS
SECURITY

Final Term Period

Unit 10: Internet Services Security


Essential Learning

Week

Content Standards

Declarative Knowledge

Functional Knowledge

Intended Learning Outcomes

Demonstrate
understanding in

1. Web Server Security


2. FTP Security
3. Browser Security

Discussing the different


types of network service
security

Illustrate the different types of


network service security

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Suggested Teaching/
Learning Activities
Gapped Lecture
Virtual Environment
Page 5 of 9

Assessment Tasks
Laboratory Activity
CONFIGURING IIS

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department
14

Internet
information
security

4. Directory Services
Security

Apply network service security

PERMISSION

Configuring the network


service security

Quiz#6

Final Term Period

Unit 11: Operational Security


Essential Learning

Week

Content Standards

Declarative Knowledge

Functional Knowledge

Intended Learning Outcomes

Suggested Teaching/
Learning Activities

Demonstrate
knowledge of
Operational
security

1. Business Security
2. Physical Security

Discussing the different


network security
a. Business
b. Physical

Discuss the different network


security
Features and functions for
business and physical security

Gapped Lecture
Brainstorming

15

Final Term Period

Unit 12: Operational Security


Essential Learning

Week

Content Standards

Declarative Knowledge

Functional Knowledge

Intended Learning Outcomes

Demonstrate
understanding of
Operational
Security

1. Security Planning
2. Incident Response

Explaining security
planning concepts

discuss security planning


concepts

Analyzing incident
response

Identify incident response

16

Final Term Period

Unit 13: Case Study


Essential Learning

Week

Content Standards

Declarative Knowledge

Functional Knowledge

Intended Learning Outcomes

Demonstrate
competence

1. Reliable Network
implementation

Analyzing reliable network


implementation

Illustrate reliable network


implementation

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Suggested Teaching/
Learning Activities
Interactive/Reflective
Lecturing
Brainstorming

Assessment Tasks
Quiz#7

Assessment Tasks

Group Activity

Suggested Teaching/
Learning Activities

Assessment Tasks

Problem solving scenario

Group Presentation

Page 6 of 9

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department

17

indifferent network
security, features
and
countermeasures

2. Network
vulnerability and
countermeasure
Final Examination

Identifying network
vulnerability and
countermeasure

18
Basic Readings

Extended Readings

Course Assessment
Course Policies

Analyze network vulnerability

about network security and


its vulnerability of an specific
institution

Practice countermeasure

FINAL EXAMINATION WEEK


Textbooks
:
1. Principles of information Security.by: Michael E. Whitman and Herbert J. Mattord(Jan 1, 2011)
2. CompTIA Security+ Study Guide.by: Emmett Dulaney and Chuck Easttom (May 5, 2014)
3. Introduction to Computer Security. By: Michael Goodrich and Roberto Tamassia (Oct 25, 2010)
4.Cryptography and Network Security: Principles and Practice (6th Edition) by William Stallings (Mar 16, 2013)
1. Info-Security Magazine
2. Security Electronics and Networks
3. Security and IT Magazines
To be discussed by the Committee on Grading System
Language of Instruction
The language of instruction is English.
Attendance
The University requires that every student to attend all classes regularly. Anyone who incurs 20 % (11 hours) of the total hours of instruction may be
given a failing grade, if majority of absences are unexcused. (University of Makati, Student Handbook)
Homework, Written Reports and Reaction Papers, Case Study
Course Portfolio

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Page 7 of 9

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department

Honor, Dress and Grooming Code


All students are required to attend classes in their prescribed uniform:
For Male Students
White polo with patch sewn a little above the left side of the chest
Brown Slacks
Black Shoes
ID
For Female Students
White Blouse with school patch
Brown Pants
Black closed leather shoes
ID

Committee Members
Consultation Schedule

Students shall at all time neat, clean and decent in their clothing, orderly, respectful, and courteous in their conduct.
(University of Makati, Student Handbook)
All students of University of Makati are expected to conduct themselves properly, to respect the persons around them and the rights of their
fellow students, faculty members, school administrators, school authorities and employees. Also, they should preserve human dignity and uphold the good name
of the University at all times. (University of Makati, Student Handbook)
Cluster Leader: RAUL M. DE VERA
Members: PERCIVAL ADAO
Faculty Member : Raul Madriaga De Vera
Email-address
: rmdevera29@gmail.com
Consultation Hours: mwf 12-1pm / Tth 3-6pm
Time and Venue : Umakadmn bldg. faculty room

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Page 8 of 9

UNIVERSITY OF MAKATI
J.P. Rizal Extension, West Rembo Makati City

COLLEGE OF COMPUTER SCIENCE


Hardware Department
Course Title

NETWORK SECURITY

Course Code

COMNET 10

AY/Term of Effectivity

Prepared by:

Checked by:

Approved by:

Revised by:

PROF. RAUL M. DE VERA


Faculty, Hardware Program

PROF. ANNA CHARISMA


F. DECHAVEZ
Chair, Hardware Program

DALISAY G. BRAWNER, ED. D


VP for Academic Affairs

PROF. SHIRLEY M. PANGAN


Faculty, Hardware Program

Prepared on:

Checked on:

Approved on:

Revised on:

2015-2016 / 1st Semester

UMakCollege of Computer ScienceOBTL Course Plan in NETWORK SECURITY

Page 9 of 9