Maricopa Community Colleges  CIS276AF   19994-20015 
Official Course Description: MCCCD Approval: 03/23/99
CIS276AF 19994-20015 L+L 2 Credit(s) 3 Period(s)
Securing Intranets with BorderManager
Set up and management of BorderManager. Covers packet filtering, Network Address Translator (NAT), Internet Protocol (IP) Gateway and Proxy Cache Services. Installing and configuring emphasized. Prerequisites: CIS242 and CIS245AD, or permission of instructor.
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
CIS276AF   19994-20015 Securing Intranets with BorderManager
1. Identify the major components of BorderManager and how they are used. (I)
2. Install BorderManager on an IntranetWare server. (II)
3. Configure packet filtering on the BorderManager server. (III)
4. Configure the Network Address Translator (NAT) on the BorderManager server. (IV)
5. Configure the Internet Protocol (IP) Gateway. (V)
6. Configure a proxy cache server and implement hierarchical caching. (VI)
7. Configure and enable a virtual private network. (VII)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
CIS276AF   19994-20015 Securing Intranets with BorderManager
    I. BorderManager
        A. Defined
        B. Components
        C. Features
        D. Firewall Solution
        E. Security
      II. Installation
          A. Requirements
          B. Procedure
          C. Clients
          D. Snap-ins
        III. Packet Filtering
            A. Defines
            B. Types of Filters
            C. Firewalls
            D. Configure
          IV. Network Address Translator (NAT)
              A. Benefits
              B. Modes
                1. Dynamic
                2. Static
              C. Secondary Addresses
            V. Internet Protocol (IP) Gateway
                A. Types
                B. Differences
                C. Components
                D. User Access
              VI. Proxy Cache Services
                  A. Access Control Rules
                  B. Cyber Patrol
                  C. Tuning
                VII. Virtual Private Network
                    A. Function
                    B. Encryption
                    B. Master and Slave Key Generation
                    C. Steps
                    D. NetWare Administrator
                    E. Protocol
                Go to Description    Go to top of Competencies    Go to top of Outline