Version: 3/20/2019 2
Additional Course Information
Topical Outline: Each offering of this course must include the following topics (be sure to include information regarding lab,
practicum, and clinical or other non-lecture instruction).
Topical Outline – Each offering of this course must include the following topics (be sure to include information regarding
lab, practicum, clinical or other non-lecture instruction):
- Infrastructure Monitoring
- Intrusion Detection Systems
- Life-cycle of a Vulnerability
- Proactive Intrusion Prevention and Response via Attack Graphs
- Network Flows and Anomaly Detection
- Web Application Firewalls
- Wireless IDS/IPS
- Physical Intrusion Detection for IT
- Geo-spatial Intrusion Detection
- Visual Data Communications
Course Learning Outcomes:
Learning Outcomes: Upon successful completion of this
course, students will:
1. Build IDS sensors and attach them to the network
(hardware and software);
2. Install and manage a secure communication link
between all sensors and the monitor;
3. Install and manage event database(s); analyze an event
and trends;
4. Install, manage, and interpret syslog servers and system
logs;
5. Identify legal and policy issues associated with system
and network monitoring; and deploy, implement, and test
IDS security plan.
Individual/Group Assignments
Individual/Group Projects
Reading Assignments
Presentations
Lab Works/Assignments
Quizzes/Tests/Exams
Required text(s), optional text(s) and/or materials to be supplied by the student:
Practical Intrusion Analysis, 1st Edition, Ryan Trost, Addison-Wesley Professional PTG, 2010, ISBN: 978-0321591807
Suggested Course Maximum:
20