Tasks:
• How would the operations of packet filtering and
encryption be used:
Preventing the spread of malicious code
Preventing intrusion attacks
Deliverables and format:
Submit your answer in a Microsoft Word document
Font: Arial; 10
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 6
Due: Week 8
Wednesday, January 28, 2009
IS316 Lesson Plan 01/28/09
OBJECTIVES
After completing this unit, the student will have the opportunity to:
11. Explain bastion host.
11.1 Define bastion host.
11.2 Define the general requirements for installing a bastion host.
11.3 Describe how to configure a bastion host.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Assignment/Activity Deliverable
Read Chapter 9, pp. 277–318
Chapter 9 Review Questions
Case Assignment 1:
From textbook, complete Case Project 8-1 on page 274:
Analyze Bastion Host Requirements
The students will submit an essay
in Microsoft Word format. It
should be a minimum of 1 page.
Font: Arial
Font Size: 10 Point
Due: By end of Week 7
REVIEW QUESTIONS
Chapter 8
1. Review Questions 1–15, pp. 159–161
LAB 1: HARDWARE AND SOFTWARE FIREWALLS
Learning Objectives:
• Contrast hardware and software firewalls.
Lab Procedures:
• Install software firewalls on student hard drives.
Security Intrusion Detection and VPNs
LAB 2:
Complete Project 8-3 on page 270 from the textbook, Holden, Greg, Guide to Firewalls and Network SKIP THIS LAB
Security Intrusion Detection and VPNs
LAB 3:Complete Project 8-4 on page 271 from the textbook, Holden, Greg, Guide to Firewalls and NetworkSecurity Intrusion Detection and VPNs
http://www.netscantools.com/downloadfiles/old/nst431.zip
LAB 4:Complete Project 8-5 on page 272 from the textbook, Holden, Greg, Guide to Firewalls and NetworkSecurity Intrusion Detection and VPNs
After completing this unit, the student will have the opportunity to:
11. Explain bastion host.
11.1 Define bastion host.
11.2 Define the general requirements for installing a bastion host.
11.3 Describe how to configure a bastion host.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Assignment/Activity Deliverable
Read Chapter 9, pp. 277–318
Chapter 9 Review Questions
Case Assignment 1:
From textbook, complete Case Project 8-1 on page 274:
Analyze Bastion Host Requirements
The students will submit an essay
in Microsoft Word format. It
should be a minimum of 1 page.
Font: Arial
Font Size: 10 Point
Due: By end of Week 7
REVIEW QUESTIONS
Chapter 8
1. Review Questions 1–15, pp. 159–161
LAB 1: HARDWARE AND SOFTWARE FIREWALLS
Learning Objectives:
• Contrast hardware and software firewalls.
Lab Procedures:
• Install software firewalls on student hard drives.
Security Intrusion Detection and VPNs
LAB 2:
Complete Project 8-3 on page 270 from the textbook, Holden, Greg, Guide to Firewalls and Network SKIP THIS LAB
Security Intrusion Detection and VPNs
LAB 3:Complete Project 8-4 on page 271 from the textbook, Holden, Greg, Guide to Firewalls and NetworkSecurity Intrusion Detection and VPNs
http://www.netscantools.com/downloadfiles/old/nst431.zip
LAB 4:Complete Project 8-5 on page 272 from the textbook, Holden, Greg, Guide to Firewalls and NetworkSecurity Intrusion Detection and VPNs
Wednesday, January 21, 2009
Project Part 3
Tasks:
• The operations of a proxy server would be used to perform
which tasks:
Preventing the spread of malicious code
Preventing intrusion attacks
Deliverables and format:
Submit your answer in a Microsoft Word document
Font: Arial; 10
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 5
Due: Week 6
• The operations of a proxy server would be used to perform
which tasks:
Preventing the spread of malicious code
Preventing intrusion attacks
Deliverables and format:
Submit your answer in a Microsoft Word document
Font: Arial; 10
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 5
Due: Week 6
Tuesday, January 20, 2009
IS316 Class Agenda for 01/21/09
UNIT 5 – DESCRIBE PROXY SERVERS
AND APPLICATION-LEVEL FIREWALLS
READING
• Chapter 5, pp. 135–170
OBJECTIVES
After completing this unit, the student will have the opportunity to:
5. Describe proxy servers and application-level firewalls.
5.1. Define proxy servers.
5.2. Define application-level firewalls.
5.3 Explain the difference between proxy servers and packet filtering.
5.4 Identify the benefits of the most proxy based firewall products.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
UNIT 6 – EXPLAIN HOW ENCRYPTION
COMPLEMENTS FIREWALL
ACTIVITIES
READING
• Chapter 7, pp. 203–242
OBJECTIVES
After completing this unit, the student will have the opportunity to:
6. Explain how encryption complements firewall activities.
6.1. Identify the role encryption plays in firewall architecture.
6.2. Identify the need for digital certificates.
6.3. Identify workings of SSL and other encryption schemes.
6.4. Explain IPSec.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
* READING
Chapter 8, pp. 243–276
* Case Assignment 1:
From textbook complete Case Project 5-1, pg 169: Use Private IP Addresses and Share a Connection
* LAB 2: Complete Project 5-1 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
* Case Assignment: From textbook, complete Case Project 7-2 on page 241: Encryption
* Project Part 3: Submission
* Project Part 4: Initiation
Refer to syllabus under course project for deliverables.
Verify their understanding of the project as well as thedeliverables required.
* LAB 1:
Complete Project 7-1 on page 234 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
NOTE:PGP is no longer provided by MIT
Get OpenPGP http://ppgp.sourceforge.net
* LAB 2:
Complete Project 7-2 on page 235 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
* LAB 3:
Complete Project 7-3 on page 237 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
*LAB 4:
Complete Project 7-4 on page 237 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
AND APPLICATION-LEVEL FIREWALLS
READING
• Chapter 5, pp. 135–170
OBJECTIVES
After completing this unit, the student will have the opportunity to:
5. Describe proxy servers and application-level firewalls.
5.1. Define proxy servers.
5.2. Define application-level firewalls.
5.3 Explain the difference between proxy servers and packet filtering.
5.4 Identify the benefits of the most proxy based firewall products.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
UNIT 6 – EXPLAIN HOW ENCRYPTION
COMPLEMENTS FIREWALL
ACTIVITIES
READING
• Chapter 7, pp. 203–242
OBJECTIVES
After completing this unit, the student will have the opportunity to:
6. Explain how encryption complements firewall activities.
6.1. Identify the role encryption plays in firewall architecture.
6.2. Identify the need for digital certificates.
6.3. Identify workings of SSL and other encryption schemes.
6.4. Explain IPSec.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
* READING
Chapter 8, pp. 243–276
* Case Assignment 1:
From textbook complete Case Project 5-1, pg 169: Use Private IP Addresses and Share a Connection
* LAB 2: Complete Project 5-1 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
* Case Assignment: From textbook, complete Case Project 7-2 on page 241: Encryption
* Project Part 3: Submission
* Project Part 4: Initiation
Refer to syllabus under course project for deliverables.
Verify their understanding of the project as well as thedeliverables required.
* LAB 1:
Complete Project 7-1 on page 234 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
NOTE:PGP is no longer provided by MIT
Get OpenPGP http://ppgp.sourceforge.net
* LAB 2:
Complete Project 7-2 on page 235 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
* LAB 3:
Complete Project 7-3 on page 237 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
*LAB 4:
Complete Project 7-4 on page 237 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
IS316 Class Agenda for 01/14/09
UNIT 4 – EXPLAIN PACKET FILTERING
READING
• Chapter 4, pp. 101–134
OBJECTIVES
After completing this unit, the student will have the opportunity to:
4. Explain packet filtering.
4.1 Define packets.
4.2 Define packet filtering.
4.3 Identify various approaches to packet filtering.
4.4 Explain rules of specific packet filtering.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
* READING Chapter 5, pp. 135–170
* READING Chapter 7, pp. 203–242
* Case Assignment 1:
Complete Case Project 4-1 on page 132: Design a Packet
Filtering Solution.
* Project Part 3: Initiation
Refer to syllabus under course project for deliverables.
Verify their understanding of the project as well as the
deliverables required.
* REVIEW QUESTIONS
Chapter 4
1. Review Questions 1–21, pp. 125–127
* LAB 2:
Complete Project 4-1 on page 128 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
NOTE: Tiny Personal Firewall is not longer available, instead use the following:
http://download.zonealarm.com/bin/free/1025_update/zaSetup_en.exe
* LAB 3:
Complete Project 4-2 on page 129 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
* LAB 4:
Complete Project 4-5 on page 131 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
*LAB 5:
Complete Project 4-6 on page 132 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
READING
• Chapter 4, pp. 101–134
OBJECTIVES
After completing this unit, the student will have the opportunity to:
4. Explain packet filtering.
4.1 Define packets.
4.2 Define packet filtering.
4.3 Identify various approaches to packet filtering.
4.4 Explain rules of specific packet filtering.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
* READING Chapter 5, pp. 135–170
* READING Chapter 7, pp. 203–242
* Case Assignment 1:
Complete Case Project 4-1 on page 132: Design a Packet
Filtering Solution.
* Project Part 3: Initiation
Refer to syllabus under course project for deliverables.
Verify their understanding of the project as well as the
deliverables required.
* REVIEW QUESTIONS
Chapter 4
1. Review Questions 1–21, pp. 125–127
* LAB 2:
Complete Project 4-1 on page 128 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
NOTE: Tiny Personal Firewall is not longer available, instead use the following:
http://download.zonealarm.com/bin/free/1025_update/zaSetup_en.exe
* LAB 3:
Complete Project 4-2 on page 129 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
* LAB 4:
Complete Project 4-5 on page 131 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
*LAB 5:
Complete Project 4-6 on page 132 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
Wednesday, January 7, 2009
IS316 Class Agenda for 01/07/09
Explain Firewall Configuration Strategies
Set up firewal rules
Implementation of different firewall configuration strategies
Activities and Assignments
Case Assignment 1
Complete Case Project 3-3 on page 99: Desing a Public Access and Private Security Plan
Deliverable: Submit Documented and written plan
Due: by week 5
Review Questions
Chapter 3 1-21, pp. 92-94
Lab 1: Hardware Firewalls
Lab Procedures:
- Establish network
- IP addresses established by students
Labs to execute
From the LabSim Security + CD, complete 5.2 Firewalls
Questions to answer
What is the difference when enableing the reserved or well-known ports on the firewall versus enabling the port in NAT?
Lab2:
Complete project 3-1
Lab3:
Complete project 3-2
Lab4:
Complete project 3-3
Set up firewal rules
Implementation of different firewall configuration strategies
Activities and Assignments
Case Assignment 1
Complete Case Project 3-3 on page 99: Desing a Public Access and Private Security Plan
Deliverable: Submit Documented and written plan
Due: by week 5
Review Questions
Chapter 3 1-21, pp. 92-94
Lab 1: Hardware Firewalls
Lab Procedures:
- Establish network
- IP addresses established by students
Labs to execute
From the LabSim Security + CD, complete 5.2 Firewalls
Questions to answer
What is the difference when enableing the reserved or well-known ports on the firewall versus enabling the port in NAT?
Lab2:
Complete project 3-1
Lab3:
Complete project 3-2
Lab4:
Complete project 3-3
Subscribe to:
Comments (Atom)