IT SECURITY FUNDAMENTALS
Overview
1) Introduction to Security Management Practices
- information security framework (e.g. ISO17799 or COBIT)
- security models, confidentiality, integrity and available
- security evaluation criteria (e.g. TCS, ITSEC)
- risk analysis, adminstrative controls and security policies
2) Password Management and User Authentication
- password management and attack methods (e.g. dictionary attack)
- hash functions (e.g. SHA1, SHA2) and shadow password
- challenge response authentication, mutual authentication, Kerberos authentication
- man in the middle attack
3) Cryptography and Key Management
- review on crytography (e.g. perfect secrecy, cipher text)
- sysmmetric and asymmetric cryptography (e.g. block ciphers, DES, 3DES and AES)
- asymmetric crytography, message integrity and digital signature
- key exchange algorithm and key management
4) Virtual Private Network
- introduction to VPN (e.g. PPTP, Site-to-site VPN, Client based VPN)
- IPSec Negotiation, integrity checking and packet encapsulation in IPSec
- site-to-site VPN vs client-based VPN
- dead peer discovery mechanism
5) Network Infrastructure and Perimeter Protection
- firewall topology and implementation, NAT, security zone and demilitarized zone
- physical security, device redundancy, router security and VLAN switch
- port control, packet filtering, session filtering, circuit gateway, application gateway
- device based firewall vs. host based firewall
- introduction to Identity and Access Management (ex: Shibboleth, ADFS, OAuth)
- degradation of perimeter security, cloud services and blast radius
6) Protocol Security
- OSI protocol analysis and sniffing tools
- routing protocol security - RIP, OSPF, BGP routing protocols (e.g. router authentication, directed broadcast control, black hold filtering, unicast reverse path forwarding, path integrity)
- ICMP protocol security (e.g. smurf attack, ping of death, syn flooding attack)
- IP security (e.g. spoofing, hijacking, injection and DoS by connection reset)
- data link layer security issue (e.g. IP permit lists, protocol filtering and control, LAN flodding)
7) Application Level Security
- authentication applications (e.g. Kerberos, X.509, PKI)
- network service security (e.g. SNMP, DNS, NAT)
- electronic mail security (e.g. PEM, PGP, S/MIME)
- web security and e-commerce (e.g. SSL, TLS, HTTPS, SET)
- fault tolerance mechanisms
8) Intrusion Detection and Prevention
- malicious software (e.g. virus, worms, Trojan Horse), denial of service and buffer overflow attack
- network traffic signature, port scanning and activity monitoring
- host based and network based IDS deployment
- intrusion detection system and incident response
- SMTP gateway and proxy server
9) Wireless Security
- wireless architecture and standards (e.g. 802.11, 802.15, 802.16)
- SSID, shared authentication, WEP, EAP, WAP
Lecture, seminar, demonstration, and hands-on assignments/projects
The course evaluation is consistent with the Douglas College Evaluation Policy.
Lab Assignments 10%-20%
Quizzes* 5% - 20%
Midterm Examination* 25% - 40%
Final Examination* 25% - 40%
------------
Total 100%
*In order to pass the course, students must, in addition to receiving an overall course grade of 50%, also achieve a grade of at least 50% on the combined weighted examination components (including quizzes, tests, exams).
Students may conduct research as part of their coursework in this class. Instructors for the course are responsible for ensuring that student research projects comply with College policies on ethical conduct for research involving humans, which can require obtaining Informed Consent from participants and getting the approval of the Douglas College Research Ethics Board prior to conducting the research.
At the end of this course, successful students should be able to:
- Use security terminologies, management models, policy requirements and industries best practice.
- Identify and describe security issues in OSI protocols.
- Conduct basic risk analysis and identify security vulnerability in enterprise network systems.
- Describe and implement cryptographic algorithms, their characteristics and application to network security.
- Design and implement secure network infrastructure with network security components such as, VPN, firewall and/or proxy servers.
- Analyze network traffic and protocols using tools such as packet sniffers.
William Stallings. Network Security Essentials: Applications and Standards. Latest edition. Prentice Hall.
OR
other textbook approved by department.
Requisites
Course Guidelines
Course Guidelines for previous years are viewable by selecting the version desired. If you took this course and do not see a listing for the starting semester / year of the course, consider the previous version as the applicable version.
Course Transfers
These are for current course guidelines only. For a full list of archived courses please see https://www.bctransferguide.ca
Institution | Transfer Details for CSIS 3155 |
---|---|
Athabasca University (AU) | AU COMP 400 (3) |
Capilano University (CAPU) | CAPU COMP 1XX (3) |
Coquitlam College (COQU) | No credit |
Kwantlen Polytechnic University (KPU) | KPU INFO 2411 (3) |
Okanagan College (OC) | OC COSC 232 (3) |
Simon Fraser University (SFU) | SFU CMPT 2XX (3) |
Thompson Rivers University (TRU) | TRU COMP 3260 (3) |
University Canada West (UCW) | No credit |
University of British Columbia - Okanagan (UBCO) | UBCO COSC_O 2nd (3) |
University of British Columbia - Vancouver (UBCV) | UBCV CPSC_V 2nd (3) |
University of Northern BC (UNBC) | UNBC CPSC 3XX (3) |
University of the Fraser Valley (UFV) | UFV CIS 3XX (3) |
University of Victoria (UVIC) | UVIC CSC 1XX (1.5) |
Course Offerings
Winter 2025
CRN | Days | Instructor | Status | More details |
---|---|---|---|---|
CRN
15478
|
Tue | Instructor Last Name
Eng
Instructor First Name
Nelson
|
Course Status
Open
|
CSIS 3155 001 is restricted to students in the following programs: Computing Studies and Information Systems Diploma, PBD Computer & Info Systems (Data Analytics, Emerging Technology, and Cybersecurity), PDD Information & Communication Technology, and PDD Data Analytics.
CRN | Days | Instructor | Status | More details |
---|---|---|---|---|
CRN
16173
|
Fri | Instructor Last Name
Eng
Instructor First Name
Nelson
|
Course Status
Open
|
CSIS 3155 002 is restricted to students in the following programs: Computing Studies and Information Systems Diploma, PBD Computer & Info Systems (Data Analytics, Emerging Technology, and Cybersecurity), PDD Information & Communication Technology, and PDD Data Analytics.