I certify that this is entirely my own work, except where I have given fully-documented references to the work of others. I understand the definition and consequences of plagiarism and acknowledge that the assessor of this assignment may, for the purpose of assessing this assignment:
- Reproduce this assignment and provide a copy to another member of academic
- staff; and/or Communicate a copy of this assignment to a plagiarism checking
- service (which may then retain a copy of this assignment on its database for
- the purpose of future plagiarism checking)
This course repository provides the work completed and assignments given during Enterprise and Network Security Controls, taught by Professor Paden. It includes essential information about the course, such as its description, objectives, and required materials. Please read through this document to familiarize yourself with the course content and expectations.
Students will examine network-based threats whether originating from the Internet or the local LAN, and learn about ways to protect, detect, and defend the enterprise network from such attacks. The relationship between user network policy and securing the network will also be explored. Students will participate in hands-on experiments and demonstrate their understanding of subject matter via projects and presentations:
- Introduction to Information Security, Security Policies and Standards
- Log Management and Analysis
- Intrusion Detection Systems
- Authenticating Users
- Introduction to Network Firewalls and Packet Filtering
- Firewall Configuration and Administration
- Working with Proxy Servers and Application Level Firewalls
- Encryption – The Foundation for the Virtual Private Network
Upon completion of this course, the student will be able to:
- segment, defend and establish visibility over an enterprise network.
- configure network security devices such as network firewalls in order to segment a network and enforce network security policies.
- research, design and deploy a logging infrastructure in order to gain visibility into enterprise security events.
- correlate and analyze network security events in the context of a security information and event management tool
- deploy network proxy servers in order to gain visibility on network traffic
- research, integrate and deploy network intrusion detection tools to complement a logging infrastructure
- research, duplicate and mitigate common network security vulnerabilities.
- design and deploy secure remote access solutions to include site-to-site and remote access use cases.