School of Computer & Information Sciences
ISOL 532 Ã¢â‚¬â€œ Telecommunications and Network Security
Section Ã¢â‚¬â€œ A02
SEMESTER Ã¢â‚¬â€œ Fall 2020 First BI-Term
Duration: 08/24/2020 – 10/16/2020
Online Support (IT)
and I-Learn Policy:
Office Hours: By appointment
757-749-2260 (Cell) Can receive text & voice.
All members of the University of the CumberlandsÃ¢â‚¬â„¢ community who use the UniversityÃ¢â‚¬â„¢s computing,
information or communication resources must act responsibly.
Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
Various network security-related issues are introduced and examined. Different types of VPNs for securing
data in an organizational setup are discussed as well as the benefits and architecture of a VPN and how to
implement a VPN. Other topics include the utility of firewalls in tackling security problems and the
limitations of a firewall. In addition, instruction is also given on how to construct, configure, and administer a
firewall and the functionality of a firewall.
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
Ã¢â‚¬Â¢ Explain the fundamental concepts of network security. (Major Instructional Areas: Network security
risks, threats, and vulnerabilities)
Ã¢â‚¬Â¢ Describe the fundamental functions performed by firewalls. (Major Instructional Areas: Firewall
types, functions, uses, and deployment strategies)
Ã¢â‚¬Â¢ Describe the foundational concepts of VPNs. (Major Instructional Areas: VPN types, functions, uses,
and deployment strategies)
Ã¢â‚¬Â¢ Recognize the impact that malicious exploits and attacks have on network security.
Ã¢â‚¬Â¢ Describe network security implementation strategies and the roles each can play within the security
life cycle. (Major Instructional Areas: Network-centric TCP/IP protocols and applications)
Ã¢â‚¬Â¢ Identify network security management best practices and strategies for responding when security
measures fail. (Major Instructional Areas: Layered network security strategies; secure network
design; best practices and strategies for network security and incident response)
Ã¢â‚¬Â¢ Manage and monitor firewalls and understand their limitations.
Ã¢â‚¬Â¢ Assess firewall design strategies and apply firewall management best practices.
Ã¢â‚¬Â¢ Appraise firewall and other security options available for personal and small office/home office
Ã¢â‚¬Â¢ Appraise elements of VPN implementation and management.
Ã¢â‚¬Â¢ Describe common VPN technologies.
Ã¢â‚¬Â¢ Follow the creation of an example firewall implementation and an example VPN implementation.
Ã¢â‚¬Â¢ Evaluate available resources and trends in network security.
There are no prerequisites for this course.
Stewart, James M. Network Security, Firewalls, and VPNs, 2nd ed. Burlington, MA: Jones & Bartlett, 2014
Virtual Security Cloud Labs*
Student Lab Manual (available within the virtual lab environment) *
Other articles and readings may be assigned by course professor.
Please use the following authorÃ¢â‚¬â„¢s names, book/article titles, Web sites, and/or keywords to search for
supplementary information to augment your learning in this subject.
Seymour Bosworth, et al. – Computer Security Handbook, 5th ed. (Chapters 3, 21, and 26)
Douglas E Comer – Internetworking with TCP/IP, 5th ed.
Anne Henmi (ed) – Firewall Policies and VPN Configurations (Chapters 2 and 5)
Jonathan Katz – Introduction to Modern Cryptography: Principles and Protocols. Chapman &
Mark Lewis – Comparing, Designing, and Deploying VPNs
John Mairs – VPNs: A Beginner’s Guide
Noonan et al. – Firewall Fundamentals
Michael Rash – Linux Firewalls: Attack Detection and Response With Iptables, Psad, and Fwsnort
Rhodes-Ousley et al. – Network Security: The Complete Reference
Debra L. Shinder, et al. – Scene of the Cybercrime, 2nd ed.
Thomas Shinder – The Best Damn Firewall Book Period, 2nd ed.
W. Richard Stevens et al. – TCP/IP Illustrated
James M. Stewart, et al. – CISSP: Certified Information Systems Security Professional Study Guide,
Keith Strassberg et al. – Firewalls: The Complete Reference
John R. Vacca, et al. – Firewalls: Jumpstart for Network and Systems Administrators
Michael E. Whitman et al. – Guide to Firewalls and Network Security
Ruixi Yuan- Virtual Private Networks: Technologies and Solutions
Elizabeth D. Zwicky et al. – Building Internet Firewalls, 2nd ed.
Common Vulnerabilities and Exposures (CVE) http://cve.mitre.org
Information Assurance Support Environment (IASE): Security Technical Implementation Guides
Chris May, et al. – Advanced Information Assurance Handbook
This Web site provides assistance in understanding and handling security vulnerabilities. It also provides
research tools on long-term changes in networked systems and gives training assistance to improve security.
International Association of Privacy Professionals (IAPP)
This Web site provides opportunity to interact with a community of privacy professionals and to learn from
their experiences. This Web site also provides valuable career advice. https://www.privacyassociation.org/
International Information Systems Security Certification Consortium, Inc., (ISC)Ã‚Â²Ã‚Â®
This Web site provides access to current industry information. It also provides opportunities in networking
and contains valuable career tools. http://www.isc2.org/
This Web site provides access to original research, practical education, career-enhancing certification,
industry-leading standards, and best practices. It also provides a network of like-minded colleagues and
contains professional resources and technical/managerial publications.
National Institute of Standards and Technology (NIST)
This Web site provides access to subject matter experts and also facilitates in research. It also provides
career-building resources and opportunities. http://www.nist.gov/index.html
National Security Agency/Central Security Service (NSA/CSS)
This Web site provides guidance on information assurance security solutions and also provides insights on
risks, vulnerabilities, mitigations, and threats. It also provides information on cryptologic support.
Course Activities and
SANS: Computer Security Training, Network Research & Resources
This Web site provides information on computer security training through several delivery methods like live
and virtual conferences, mentors, online, and onsite. It also provides certification and numerous free
security resources. http://www.sans.org
Students are expected to:
Ã¢â‚¬Â¢ Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
Ã¢â‚¬Â¢ Actively participate in activities, assignments, and discussions.
Ã¢â‚¬Â¢ Evaluate and react to each otherÃ¢â‚¬â„¢s work in a supportive, constructive manner.
Ã¢â‚¬Â¢ Complete specific assignments and exams when specified and in a professional manner.
Ã¢â‚¬Â¢ Utilize learned technologies for class assignments.
Ã¢â‚¬Â¢ Connect content knowledge from core courses to practical training placement and activities.
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic
dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the
abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The
common forms of academic dishonesty include:
Ã¢â‚¬Â¢ Cheating Ã¢â‚¬â€œ using deception in the taking of tests or the preparation of written work, using unauthorized
materials, copying another personÃ¢â‚¬â„¢s work with or without consent, or assisting another in such activities.
Ã¢â‚¬Â¢ Lying Ã¢â‚¬â€œ falsifying, fabricating, or forging information in either written, spoken, or video presentations.
Ã¢â‚¬Â¢ PlagiarismÃ¢â‚¬â€using the published writings, data, interpretations, or ideas of another without proper
Plagiarism includes copying and pasting material from the internet into assignments without properly
citing the source of the material.
Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential
penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the
entire course, or charges against the student with the appropriate disciplinary body.
When any student has exceeded 20% of the time prescribed for any class, that student will be automatically
dropped from that particular class with the grade of Ã¢â‚¬Å“F.Ã¢â‚¬Â This grade is placed on the official transcript of the
student and is treated as a failing grade in calculating the grade point average. The definition of a class
absence is a studentÃ¢â‚¬â„¢s failure to attend class for any reason. Instructors may count three times tardy or
leaving early to be equal to one class absence. There are no excused absences, regardless of the reason for
the class having been missed. However, faculty will make reasonable provisions to allow students to make up
work if the absence is due to a university-sponsored function or a medical or family emergency that is
documented in a timely manner. Allowance for students to make up work for other reasons is at each
instructorÃ¢â‚¬â„¢s discretion. A class absence does not excuse the student from being responsible for course work
missed; the student is responsible for contacting the faculty member in order to make up class assignments.
The Vice President for Academic Affairs is the authorized agent to consider any exceptions to the above
regulations. (Undergraduate Catalog)
University of the Cumberlands accepts students with certified disabilities and provides reasonable
accommodations for their certified needs in the classroom, in housing, in food service or in other areas. For
accommodations to be awarded, a student must submit a completed Accommodations Application form and
provide documentation of the disability to the Disability Services Coordinator (Mr. Jacob Ratliff, Boswell
Campus Center, Student Services Office Suite, email@example.com). When all paperwork is on
file, a meeting between the student and the Coordinator will be arranged to discuss possible
accommodations before accommodations are formally approved. Students must then meet with the
Coordinator at the beginning of each semester before any academic accommodations can be certified for
that term. Certifications for other accommodations are normally reviewed annually.
The only authorized electronic means of academic, administrative, and co-curricular communication
between University of the Cumberlands and its students is through the UCumberlands email system (i.e.
Webmail). Each student is responsible for monitoring his/her University email account frequently. This
is the primary email account used to correspond with you directly by the University; imperative program
information is sent to this email account specifically from campus and program office.
Ã¢â‚¬Â¢ Students should check for e-mail and class announcements using iLearn (primary) and University of the
Cumberlands webmail (secondary).
Ã¢â‚¬Â¢ Students are expected to find out class assignments for missed classes and make up missed work.
Ã¢â‚¬Â¢ Students are expected to find out if any changes have been made in the class or assignment schedule.
Ã¢â‚¬Â¢ Written work must be presented in a professional manner. Work that is not
submitted in a professional manner will not be evaluated and will be returned as unacceptable.
o There is a craft to writing. Spelling, grammar, punctuation and diction (word usage) are all
tools of that craft. Writing at the collegiate level will show careful attention to these
elements of craft. Work that does not exhibit care with regard to these elements will be
considered as inadequate for college writing and graded accordingly.
Ã¢â‚¬Â¢ Students are expected to take the examinations on the designated dates. If you are unable to take the
exam on the scheduled date and know in advance, you are to make arrangements with your professor
before the designated date. If you miss the exam, you must have a legitimate reason as determined by
Deadlines and Dues
Recognizing that a large part of professional life is meeting deadlines, it is necessary to develop time
management and organizational skills. Failure to meet the course deadlines may result in penalties. Keep in
mind that all deadlines are set using Eastern Standard Time (EST). Late assignments will NOT be accepted
and will result in a grade of a zero. I do not accept excuses. If there is a technical issue, submit a trouble
ticket and cc the professor.
Writing Expectations: Learning outcomes for candidatesÃ¢â‚¬â„¢ writing competencies include clarity of thought, discernment in planning
and organization, and integration of evidence and criteria.
Ã¢â‚¬Â¢ The instructor expects that students will have knowledge of appropriate forms of documentation
and use it where appropriate. APA format is required and style of notation to credit all sources
that are not your own. Only MS Word Documents will be accepted for assignments unless
specified by the professor. The APA Guide is attached in the Course Home Page.
Ã¢â‚¬Â¢ There is a craft to writing. Spelling, grammar, punctuation and diction (word usage) are all tools
of that craft. Writing at the collegiate level will show careful attention to these elements of craft.
Work that does not exhibit care with regard to these elements will be considered as inadequate
for college writing and graded accordingly.
Ã¢â‚¬Â¢ All assignments, unless otherwise instructed, should be submitted in APA format.
Study after study has linked successful academic performance with good class participation. Those who
assume positions of responsibility must Ã¢â‚¬Å“show upÃ¢â‚¬Â in order to be effective. Therefore, students are expected
to actively participate in intelligent discussion of assigned topics in all areas (Discussion Board Activities,
Synchronous Sessions, Forums, Shared Papers, etc.) to help process course material and/or to demonstrate
understanding of course content. Point adjustments will be taken for non-participation.
Both undergraduate and graduate students have the right to challenge a grade. If discussions with the course
instructor and department chair do not lead to a satisfactory conclusion, students may file a formal written
appeal with the Vice President for Academic Affairs, who will forward the appeal to the chair of the
Academic Appeals Committee. This formal written appeal must be filed by the end of the 4th week of classes
in the next regular term following the term in which the course in question was taken. The Academic Appeals
Committee then gathers information from the student, the instructor, and any other relevant parties. The
Committee will deliver its recommendation on the complaint to the Vice President for Academic Affairs.
After reviewing this recommendation and concurring or amending it, the Vice President for Academic Affairs
will inform the student and instructor of the disposition of the complaint no later than the last day of classes
of the term in which the complaint was filed. Records of all actions regarding academic grade appeals,
including their final disposition, are maintained by the Vice President for Academic Affairs and the Academic
Appeals Committee. (Undergraduate Catalog/Graduate Catalog)
Links to Support:
Orientation to I-Learn: Student training course on I-Learn,
Course Assignments and Evaluation
Graded work will receive a numeric score reflecting the quality of performance. Relative weights assigned to
graded work are as follows:
Students will be evaluated on:
1. Exams – Each exam will consist of multiple choice, multiple answer, matching, and True/False questions.
Exam items derived primarily from lectures and readings. Exams will be available through iLearn and
2. Homework Assignments, Discussion, & Quizzes Ã¢â‚¬â€œ Assignments, Discussion, & Quizzes will be given
throughout the term. Each quiz will consist of multiple choice/answer, short answer questions,
matching, and True/False questions. Quiz items derived primarily from lectures and readings. Quizzes
will be available through iLearn and completed independently. Assignments and Discussions will come
from the course lectures, materials, and required reading assignments.
3. Practical Connection Assignment Ã¢â‚¬â€œ Written Assignment where students will reflect on course concepts
and their practical connection to a working environment.
Graded work will receive a numeric score reflecting the quality of performance as given above in evaluation
methods. The overall course grade will be determined according to the following scale:
A= 90 Ã¢â‚¬â€œ 100 (90% – 100%)
B= 80 Ã¢â‚¬â€œ 89 (80% – 89%)
C = 70 Ã¢â‚¬â€œ 79 (70% – 79%)
F < 69 (Below 69%) Syllabus Disclaimer: This syllabus is intended as a set of guidelines for this course and the professor reserves the right to make modifications in content, schedule, and requirements as necessary to promote the best education possible within conditions affecting this course. Any changes to the syllabus will be discussed with the students. Tentative Course Expectations (specific due dates are listed in the course module) Week Topic & Reading Networking basics, Network security basics, threats, and issues 1 08/24 Ã¢â‚¬â€œ 08/30 2 08/31 Ã¢â‚¬â€œ 09/06 3 09/07 Ã¢â‚¬â€œ 09/13 4 09/17 Ã¢â‚¬â€œ 09/20 Chapters 1, 2, 4; NIST SP 800-30: Guide for Conducting Risk Assessments (http://csrc.nist.gov/publications/PubsSPs.html; use the latest version) Network security basics, threats, and issues Chapters 2, 7 Firewall fundamentals Part 2 Assignments Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Welcome Discussion (5pts) Syllabus/APA Quiz (5pts) Labs 1, 2, & 3 (10 pts per Lab) Plagiarism Contract (1 Extra point) *Failing to Participate in Week 1 may result in being dropped from the course. Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Labs 4 , 5 (10 pts per Lab) Discussion 2: Firewalls (10 Points) Chapters 3, 11, 12 Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Lab 6 (10 pts per Lab) Discussion 3: Social Engineering (10pts) Chapters 5, 6 NIST SP 800-61: Computer Security Incident Handling Guide, http://csrc.nist.gov/publications/PubsSPs.html Ã¢â‚¬Â¢ Lab 7 (10 pts per Lab) Ã¢â‚¬Â¢ Mid-Term (260 pts) Ã¢â‚¬Â¢ Discussion 4 (10pts) 5 5 09/21 Ã¢â‚¬â€œ 09/27 VPN fundamentals Part 2 6 09/28 Ã¢â‚¬â€œ 10/04 Chapter 10, 13 Lab 8 (10 pts per Lab) Discussion 5 (10pts) Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Lab 9: (10 pts per Lab) Discussion 6: (10pts) Practical Connection (100 pts) Lab 10: (10 pts per Lab) Project: Network Security Plan (200 Pts) Ã¢â‚¬Â¢ Discussion 7: (10pts) Ã¢â‚¬Â¢ Final Exam (260 pts) Ã¢â‚¬Â¢ Discussion 8: (10pts) Chapter 8, 14 Chapters 9, 15 7 10/05 Ã¢â‚¬â€œ 10/11 8 10/12 Ã¢â‚¬â€œ 10/15 Ã¢â‚¬Â¢ Ã¢â‚¬Â¢ Network security implementation and management Part 2 *SHORT WEEK* All assignments must be completed by the last day of the term by 5pm EST. Total Points: 1000 6 Writing Center Tip Sheet: Graduate Writing Resources Academic Writer Academic Writer provides instruction, resources, and templates for writing with APA. This is a one-stop place to do all your APA formatting requirements. You can start writing papers in Academic Writer with the templates provided, add citations with the templates provided, and save work in the program. Find it here: Activate your account with your UC credentials through the libraryÃ¢â‚¬â„¢s Citation Help Tools page: http://ucumberlands.libguides.com/c.php?g=504168 After activation visit: https://academicwriter.apa.org/ Grammarly Grammarly is a grammar, style, and punctuation editing program that gives feedback while you write. As a UC student, you get Grammarly Premium for free! No more grammar errors! With Grammarly Premium, you can customize your feedback for the style and tone you need, such as academic writing or formal tone for thesis and dissertations. Find it here: invitations were sent to your UC email (search subject: invitation to join Grammarly). CanÃ¢â‚¬â„¢t find it? Request an invite from firstname.lastname@example.org Zotero Zotero is an open-source easy to use tool to collect, organize and cite your research. As you get into larger and more complex writing projects, as are common in graduate school, you will need a way to keep your sources organized and easy to search. If you will be writing a dissertation, this is a must! Find it here: Create your free account at www.zotero.org TLC Writing Center The Learning Commons Writing Center creates resources to help graduate students with their different writing support needs. Through the Writing Center, you can find tip sheets and guides, watch short tutorial videos, and contact graduate writing fellows for questions and feedback. Find it here: The Learning Commons in iLearn Ã¢â‚¬â€œ Click on Ã¢â‚¬Å“Writing CenterÃ¢â‚¬Â on the left navigation menu. Databases Of course the Library databases can provide great research sources for your writing, but it can also provide examples of the academic writing you are creating. Search in Dissertations and Theses and Career & Technical Education Find it here: ucumberlands.edu/library Ã¢â‚¬â€œ Click on Databases A-Z Google Scholar Scholar has all the power and functionality of a Google search but focused on scholarly research and literature. Set up a Google Scholar alert to get new publications that fit your criteria sent to your inbox. Find it here: https://scholar.google.com/ 2019 UC, The Learning Commons, Writing Center Purchase answer to see full attachment