Network Security Hardening
I. Course Prefix/Number: CNS 171
Course Name: Network Security Hardening
Credits: 3 (3 lecture; 1 lab)
III. Course (Catalog) Description
Course provides students with the technical knowledge and skills in scripting required for “tighten down” security in computer network and systems. Course includes practical knowledge and step-by-step directions for securing a diverse network with multiple devices and operating systems. This course also assist students in preparing for the appropriate Network or Information Security Certification examinations. Recommend CNS 105 or consent of instructor, coordinator or program chair.
IV. Learning Objectives
Upon completion of this course the student will have learned to:
- Change Default Account Settings
- Use Administrator Accounts for Administrator Tasks Only
- Identify and Disable/Shut Down/Remove Unused and Unnecessary Services and Daemons
- Remove Rogue Connections: Wireless and Dial-Up
- Set Up Filters for Malicious Content for Each Operating System
- Test Backup and Restore Procedures
- Identify and Select a Segmentation Model
- Use Identity Management to Enforce Corporate Access Control Policies
- Manage Identities Through Workflow and Audit Processes
- Use Strong Authentication to Harden Passwords and Protect Sensitive Resources
- Design Security Requirements for Your Web Services
- Establish and test Policy to Secure Your Organization’s Services-Oriented Architecture
- Review and Implement Products that Protect Web Services
- Defend Your Environment from Mobile-Connectivity Risks
- Determine What Why, Where to Encrypt
- Configure and test for “Un”real-Time Encryption
- Use Sound Practices to Secure Data, Applications, Backups and Archives
- Determine Permissions Required for Resources
- Configure and Harden Cross-Platform Tools for Secure, Seamless Access Control
- Use Encryption to Harden Your Data Transport
- Configure and Modify Harden Your Wireless WAN
V. Academic Integrity and Student Conduct
• plagiarism (turning in work not written by you, or lacking proper citation),
• falsification and fabrication (lying or distorting the truth),
• helping others to cheat,
• unauthorized changes on official documents,
• pretending to be someone else or having someone else pretend to be you,
• making or accepting bribes, special favors, or threats, and
• any other behavior that violates academic integrity.
There are serious consequences to violations of the academic integrity policy. Oakton's policies and procedures provide students a fair hearing if a complaint is made against you. If you are found to have violated the policy, the minimum penalty is failure on the assignment and, a disciplinary record will be established and kept on file in the office of the Vice President for Student Affairs for a period of 3 years.
Please review the Code of Academic Conduct and the Code of Student Conduct, both located online at
VI. Sequence of Topics
- Do These Seven Things Before You Do Anything Else!
- Break the Network into Common Areas of Functionality for Security
- Hardening with Identity Management Systems
- Cross-Platform Authentication
- Securing Web Services
- Defending Mobile Environments
- Beyond Access Controls—Protecting Stored Data
- Protecting Database Access from the Web
- Designing & Testing Cross-Platform Access Controls
- Data Transport Encryption
- Design & Secure Remote Clients
- Plan & Secure Wireless Networks
VII. Methods of Instruction
Course may be taught as face-to-face, hybrid or online course.
VIII. Course Practices Required
- Read course materials - textbook and current journals before the class
- Frequent attendance and participation in class lecture and lab
- Complete required assignments, exercises, and examinations
- Complete LAB projects
- To ensure success of the Course and certification all Students should use practice self-test. Below are some Internet sites to help you get certified, please share other websites, with class:
- Industry Certificate Testing Information:
The following sites are the Certificate Providers please contact them directly to schedule to take the certification examination. These test providers have helpful hints and advice for successfully taking the test. Study guides, objectives, requirements for the examination and other helpful hints are available:
IX. Instructional Materials
Hardening Network Security by John Mallery et al. McGraw-Hill/Osborne (c) 2005 (624 pages)
X. Methods of Evaluating Student Progress
Evaluation methods include quizzes, examinations, completion of lab assignments and special exercises.
Final grades are determined through a weighted average of examinations, quizzes, laboratory assignments, homework assignments, class participation, and attendance. After your numerical grade has been calculated, your letter grade will be determined as follows:
|A||90–100% of the total percentage points possible|
|B||80–89% of the total percentage points possible|
|C||70–79% of the total percentage points possible|
|D||60–69% of the total percentage points possible|
|F||Less than 60% of the total percentage points possible.|
XI. Other Course Information
- Responsible Use of Computers and Information Technology
Rules for computer use are posted in computer labs as well as available in writing in each of the labs. Lab assistants and tutors are available to assist you in the lab regarding software and hardware questions. If you have a question about an assignment, however, you should contact the instructor.
Users of the College’s information technology facilities and resources, including hardware, software, networks, and computer accounts, are expected to use computer resources responsibly and appropriately, respecting the rights of other information technology users and respecting all contractual and license agreements.
Under no circumstances is any of the software used at Oakton to be copied. Copying software is in violation of Federal law and College policies. Suspected violations will be vigorously investigated and, if warranted, appropriate penalties applied. Specifically, you do not have the right (1) to make copies of software for yourself or others, (2) to receive and use unauthorized copies of software, or (3) copy all or parts of a program written by someone else.
- COLLEGE POLICY ON THE OBSERVANCE OF RELIGIOUS HOLIDAYS
Oakton Community College recognizes the broad diversity of religious beliefs of its constituencies. The College has embraced a practice of shared responsibility in the event a religious observance interferes with class work or assignments. Students who inform instructors well in advance of an intended absence for a major religious observance will not be penalized. The instructor will make reasonable accommodations for students, which may include providing a make up test, altering assignment dates, permitting a student to attend another section of the same course for a class period or similar remedies. Instructors are not responsible for teaching material again.
In response to Columbine and the NIU tragedies police agencies in Illinois have developed training for law enforcement and the public school systems. These Nationally accepted law enforcement response plans have been adopted by Oakton's Public Safety Department. Your actions will influence others therefore, Oakton is asking you as a student to:
- stay calm
- secure the immediate area; lock, block, & barricade
- call 911 and:
- report your specific location
- number of people at your location
- assailants; location, number, race, gender, clothing, physical features, type of weapon
- Side Note: There is a phone for emergency purposes placed in each classroom.
If you have a documented learning, psychological, or physical disability you may be entitled to reasonable academic accommodations or services. To request accommodations or services, contact the Access and Disability Resource Center at the Des Plaines or Skokie campus. All students are expected to fulfill essential course requirements. The College will not waive any essential skill or requirement of a course or degree program.
Oakton Community College is committed to maintaining a campus environment emphasizing the dignity and worth of all members of the community, and complies with all federal and state Title IX requirements.
Resources and support for
- pregnancy-related and parenting accommodations; and
- victims of sexual misconduct
Resources and support for LGBTQ+ students can be found at www.oakton.edu/lgbtq.
Electronic video and/or audio recording is not permitted during class unless the student obtains written permission from the instructor. In cases where recordings are allowed, such content is restricted to personal use only. Any distribution of such recordings is strictly prohibited. Personal use is defined as use by an individual student for the purpose of studying or completing course assignments.
For students who have been approved for audio and/or video recording of lectures and other classroom activities as a reasonable accommodation by Oakton’s Access Disabilities Resource Center (ADRC), applicable federal law requires instructors to permit those recordings. Such recordings are also limited to personal use. Any distribution of such recordings is strictly prohibited.
Violation of this policy will result in disciplinary action through the Code of Student Conduct.