Maricopa Community Colleges  ITS160   20046-20086 
Official Course Description: MCCCD Approval: 07/22/08
ITS160 20046-20086 L+L 3 Credit(s) 4 Period(s)
Managing Trusted Networks in the Enterprise
Establishment of trusted networks to ensure enterprise security. Techniques for the planning and implementation of trusted networks including secure Wireless LANs (WLANs) and secure email. Emphasis on hands-on labs in both the Windows and Linux environments. Builds on thorough understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) and security concepts and MS Windows and Linux Administration.
Prerequisites: ITS110, ITS130, ITS140 and ITS150 or permission of Instructor.
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
ITS160   20046-20086 Managing Trusted Networks in the Enterprise
1. Discuss the elements required for implementing and managing trusted enterprise networks. (I)
2. Describe the process for planning a trusted network. (II)
3. Demonstrate the techniques for implementing a trusted Windows and Linux network. (III, IV)
4. Manage a digital certificate infrastructure. (V)
5. Secure and manage local resources on a Windows network. (VI)
6. Secure and manage a Wireless Local Area Network (WLAN). (VII)
7. Implement industry standard methods of securing email transmissions. (VIII)
8. Implement and manage a certificate authority in a trusted network. (IX)
9. Describe the principles of Information Security Project Management. (X)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
ITS160   20046-20086 Managing Trusted Networks in the Enterprise
    I. Trusted Network Implementation
        A. Defended networks of today
        B. Trusted network services
        C. Cryptography primer
        D. Role of strong authentication
        E. Public Key Infrastructure (PKI) roles and fundamentals
      II. Planning a Trusted Network
          A. Required components
          B. Certificate paths
          C. Planning documents
          D. Certificate practices framework
        III. Microsoft Trusted Networks
            A. Certificate authority requirements
            B. Major functions of a ca hierarchy
            C. Certificate standard and format
            D. Implement Microsoft certificate authorities
            E. Microsoft enterprise root Certificate of Authority (CA)
          IV. Linux Certificate Authorities
              A. Introduction to Linux certificate authorities
              B. Certificate authorities for Linux
              C. Preparing to install a Certificate of Authority (CA)
              D. Open Lightweight Directory Access Protocol (LDAP)
              E. Using CATool
            V. Managing Certificates
                A. Certificate lifecycle and certificate management
                B. Create certificates
                C. Process certificate requests
                D. Assign a certificate
                E. Certificates on smart cards
              VI. Local Resource Security
                  A. Windows 2000 Encrypting File System (EFS) fundamentals
                  B. Configure EFS
                  C. Control EFS use
                  D. Store encrypted files on a floppy disk with EFS
                  E. Secure data with biometrics
                VII. Wireless Network Security
                    A. Wireless networking fundamentals
                    B. Wireless LAN (WLAN) fundamentals
                    C. Wireless security solutions
                    D. Wireless auditing
                    E. Wireless trusted networks
                    F. "Bluejacking" and "bluesnarffing"
                  VIII. Secure Email
                      A. Secure email fundamentals
                      B. Secure e-mail with Pretty Good Privacy (PGP)
                      C. Secure Multipurpose Internet Mail Extensions (S/MIME) background
                    IX. Building Trusted Networks
                        A. Building Windows domains - enterprise of a trust
                        B. Configuring the enterprise CA
                        C. Setting up the Linux CA
                        D. Certificate authority trust - cross trust
                        E. Secure e-mail
                        F. Certificate revocation
                      X. Information Security Project Management
                          A. Project management body of knowledge areas
                          B. Additional project planning considerations
                          C. Controlling the project
                          D. Conversion strategies
                          E. Outsourcing
                          F. Change management
                          G. Considerations for change management
                          H. Project management tools
                      Go to Description    Go to top of Competencies    Go to top of Outline