Skip to main content

Course Outlines

FSCT 8540 Network Security 1

School School of Computing and Academic Studies
Program Digital Forensics & Cybersecurity Option
Course Credits 3
Minimum Passing Grade 60%
Start Date January 05, 2021
End Date March 30, 2021
Total Hours 45
Total Weeks 14
Hours/Weeks 3.21
Delivery Type Lecture/Lab
Pre-requisites FSCT 7511
CRN 47564

Acknowledgement of Territories

The British Columbia Institute of Technology acknowledges that our campuses are located on the unceded traditional territories of the Coast Salish Nations of Sḵwx̱wú7mesh (Squamish), səl̓ilwətaɁɬ (Tsleil-Waututh), and xwməθkwəy̓əm (Musqueam).

Instructor Details

Name Bogdan Pirvoaica
E-mail Instructor to provide
Location Online
Office Hours Instructor to provide

Course Description

This course is an introduction to the fundamentals of network administration, with particular emphasis on network security monitoring. Students will learn fundamental concept related to the design of secure networks, including the deployment of security devices and sensors. Students will get hands-on experience in network traffic analysis, using packet sniffers and other network monitoring tools. Intrusion detection, attacks and defenses will be introduced to prepare students for more advanced courses in network security administration.

Course Learning Outcomes/Competencies

Upon successful completion of this course, the student will be able to:

  • Outline major security issues on a network
  • Design a secure network configuration, including placement of network devices
  • Manipulate the configuration files related to the setup and initialization of networking components
  • Configure and test cross-platform networking applications
  • Monitor network traffic using tools such as tcpdump and other packet sniffers
  • Analyze network traffic to identify compromises in security
  • Write scripts to automate network modelling and analysis tasks

Learning Resources

The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Richard Bejtlich

Publisher: O’Reilly; 2013.

Course Goals

Describe major security issues on a network.

Design a secure network configuration, including placement of network devices

Manipulate the configuration files related to the setup and initialization of networking components

Configure and test cross-platform networking applications

Monitor network traffic using tools such as tcpdump and other packet sniffers

Analyze network traffic to identify compromises in security

Write scripts to automate network modelling and analysis tasks

Evaluation Criteria

Criteria % Comments

Lab Assignments

25
Quizzes20
Midterm25
Final30
Total100

Attendance Requirements

In case of illness or other unavoidable cause of absence, the student must communicate as soon as possible with his/her instructor or Program Head or Chief Instructor, indicating the reason for the absence.

Prolonged illness of three or more consecutive days must have a BCIT medical certificate sent to the department. Excessive absence may result in failure or immediate withdrawal from the course or program

Course topics

Week of/
Number

Outcome/Material Covered

1

Basic network design TCP/IP review

2

Placement of security devices in network

3

Distributed deployment of network sensors

4

Command line packet analysis

5

Graphical packet analysis tools

6

Midterm exam

7

Network security monitoring consoles

8

Network security monitoring operations

9

Server-side compromise detection

10

Client-side compromise detection

11

Using Zeek (Bro) to track executables and extract binaries

12

Zeek (Bro) scripting

13

Final Exam

BCIT Policy

Any student who needs special assistance in the event of a medical emergency or building evacuation (either because of a disability or for any other reason) should promptly inform their course instructor(s) and Accessibility Services of their personal circumstances.

Human Rights, Harassment and Discrimination:
The BCIT community is made up of individuals from every ability, background, experience and identity, each contributing uniquely to the richness and diversity of the BCIT community as a whole. In recognition of this, and the intrinsic value of our diversity, BCIT seeks to foster a climate of collaboration, understanding and mutual respect between all members of the community and ensure an inclusive accessible working and learning environment where everyone can succeed.

Respect, Diversity, and Inclusion is a supportive resource for both students and employees of BCIT, to foster a respectful learning and working environment. Any student who feels that they are experiencing discrimination or harassment (personal or human rights-related) can confidentially access this resource for advice and support. Please see Policy 7507 – Harassment and Discrimination and accompanying procedure.

Students should make themselves aware of additional Education, Administration, Safety and other BCIT policies listed at https://www.bcit.ca/about/administration/policies.shtml

Guidelines for School of Computing and Academic Studies

Attempts:
Students must successfully complete a course within a maximum of three (3) attempts at the course. Students with two attempts in a single course will be allowed to repeat the course only upon special written permission from the Associate Dean. Students who have not successfully completed a course within three attempts will not be eligible to graduate from their respective program.

Approved

I verify that the content of this course outline is current.
Bogdan Pirvoaica, Instructor
December 20, 2020

I verify that this course outline has been reviewed.
David McKay, FSA PTS Administration-122120
December 21, 2020

I verify that this course outline has been reviewed and complies with BCIT policy.
Jennifer Talman, Associate Dean
December 21, 2020

Note: Should changes be required to the content of this course outline, students will be given reasonable notice.