Course Title: Design and implement Internetworking systems security

Part B: Course Detail

Teaching Period: Term2 2011

Course Code: EEET6779C

Course Title: Design and implement Internetworking systems security

School: 130T Vocational Engineering

Campus: City Campus

Program: C6084 - Advanced Diploma of Computer Systems Engineering

Course Contact: Program Manager

Course Contact Phone: +61 3 9925 4468

Course Contact Email: engineering-tafe@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Divya Anshu Bhardwaj

Phone: +613 9925 4163

email: divyaanshu.bhardwaj@rmit.edu.au

Nominal Hours: 100

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

Nil.

Course Description

This unit covers the design, implementation and performance monitoring of Internetworking systems. It encompasses safe working practice, evaluating customer requirements, applying sound design principles, complying with regulation and standards, incorporation of advance security technologies and documentation of design and performance monitoring.
Note: This unit applies to all aspects of Electrotechnology – engineering applications only. For general competencies related to Information Technologies refer to the latest endorsed IT Training Package.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

UEENEED022B Design and implement Internetworking systems security

Element:

1. Prepare to design Internetworking systems.

Performance Criteria:

1. Prepare to design Internetworking systems.
Performance Criteria: 1.1 OHS processes and procedures for a given work area are identified, obtained and understood.
Prepare to design Internetworking systems.
1.2 Established OHS risk control measures and procedures are followed in preparation for the work.
1.3 Design brief for the advance security technologies is developed and documented based on organisation’s assessment of its security vulnerabilities in consultation with person(s) of higher authority.
1.4 Work team/group is arranged of appropriately competent persons in accordance with skills required to meet work outcomes and organisation’s established procedures.
1.5 Activities are planned to meet scheduled timelines in consultation with others involved in the work.
1.6 Strategies are implemented to ensure network development is carried out efficiently.

Element:

2. Design Internetworking systems.

Performance Criteria:

2.1 Internetworking system is designed to comply with design brief and consideration of economical and
appropriately effective design solutions.
Design Internetworking systems.
2.2 Advance security technologies are included in the Internetworking system design. (See Note)
2.3 Internetworking system design includes specification of required media that is compliant with industry standards.
2.4 Internetworking system design is documented in accordance with organisation policies and procedures.
2.5 Internetworking system design is presented and discussed with person(s) of higher authority.
UEENEED022B – Design and implement internetworking systems — security – EE-Oz Industry Skills Council
Copy Right: Commonwealth of Australia 2007
Page 140 of 291 Training Package UEE07 – Version No 1. To be reviewed by 31 Dec 2010
2.6 Alterations to the Internetworking system design resulting from the presentation/discussion are
negotiated with person(s) of higher authority within the constraints of organisation’s policy.
2.7 Final Internetworking system design is documented and approval obtained from person(s) of higher authority

Element:

3. Implement Internetworking systems.

Performance Criteria:

3.1 Activities are planned to meet scheduled timelines in consultation with others involved in the work.
3.2 Appropriate development tools and software are selected based on specified requirements and performance standard. Implement Internetworking systems.
3.3 Knowledge of Internetworking arrangements and protocols is applied to installing, configuring and
testing advance routing technologies.
3.4 System malfunctions are identified during testing and rectified using logical techniques drawing knowledge of Internetworking arrangements and protocol.
3.5 Approaches to issues/problems are analysed to provide most effective solutions.
3.6 Quality of work is monitored against personal performance agreement and/or established organisational or professional standards.
3.7 Final Internetworking system design and implementation are documented in accordance with
organisation’s established procedures.


Learning Outcomes



Details of Learning Activities

Classroom tutorial activities:
Lectures: to introduce the important concepts.

- Attending lectures will make it much easier for you to understand the central concepts of the course
- You will feel more comfortable and you will learn more if you read the relevant material before you attend the lectures

Tutorials: to enable you to ask questions and to clarify unresolved issues
- Review the material and prepare your questions before you come to class
- There will be an overview of course content with a focus on the material students find difficult
- If something is unclear or if you find yourself falling behind please ask for help immediately
- You may be given worksheets to complete during the tutorial

Practical exercises: to give you the hands on experience of implementing and troubleshooting networks
- In general there will be one practical exercise per week
- You will perform the exercise and write it up in a lab journal
- The lab journal will be a bound exercise book
- Loose leaf binders will not be accepted
- The write up will be a record of your actions as they are performed and your corresponding observations
- The write up must be performed in the lab as you perform the practical exercise, not at a later date
- Write ups not in the lab journal will not be marked
- Write ups which are not done concurrently with the performance of the practical exercise will not be marked
- In general the detail of the write up must be sufficient for you to be able to comfortably perform the practical exercise a year or more later directly from the lab journal
- Any difficult or tricky points should be especially noted in the lab journal for future reference
- Responses to worksheets for practical exercises must be written up in the lab journal
- The neatness, completeness and the presentation of the lab journal must be of a quality such that you would be prepared to show it to a future employer as an example of your work

Work simulated activities: you will computer related tasks and scenarios to complete as you would be expected to do in industry.

Test and exams:
- You will be required to read and study at least one chapter of the course content per week

Occupational Health and Safety:
Conduct in lecture theatres, classrooms and laboratories will be of a
standard required by OH&S legislation as applied to industry.
- You must behave in such a way as not to place the health and safety of yourself or anyone else at risk
- Covered shoes must be worn in all labs
- Thongs and sandals must not be worn in any lab

Preparation for the Work place:
All skills and knowledge in this course are oriented towards current industry practices and technologies. An essential industry expectation is that you are responsible for your behaviour and actions. When you are in employment you will be expected to attend work on time on a regular basis, perform you work on time to an accepted standard and be responsible for what you do. Industry will expect you to comprehend and follow both verbal and written instructions. All industry expectations will applied to you in this course. You will be expected to:
- Observe all Occupational Health and Safety requirements
- You must behave in such a way as not to place the health and safety of yourself or anyone else at risk
- Prepare for classes
- Attend all classes regularly and on time
- Use your class time in a productive and responsible way
- Finish your work on time to an accepted standard
- Pay attention to, comprehend and follow both verbal and written instructions.
- It is your personal responsibility to be aware of course requirements and timelines
- Please ask if something is not clear


Teaching Schedule

 

WeekTopic Assessment  and Tasks
1

Lecture: Modern Network Security Threats

Lab Activity 1: Researching Network Attacks and Security Audit

Introduction to course, course guide, assessment, topics breakdown, resources, OHS issues etc.

UNEENEED022B: 1.1,1.2,1.4,1.5,1.6,2.2,2.4,3.1,3.2.

To be submitted in the class at the end of same session.
 2

Lecture : Securing Network Devices.

Lab Activity 2: Securing the Router for Administrative Access

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7 

To be submitted in the class at the end of same session.
 3Lecture: Authentication, Authorization, and Accounting.

Lab Activity 3: Securing Administrative Access Using AAA and RADIUS

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7
To be submitted in the class at the end of same session
 4

Lecture : Implementing Firewall Technologies.

Lab Activity 4: Configuring CBAC and Zone-Based Firewall

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

To be submitted in the class at the end of same session
 5

Lecture : Implementing Intrusion Prevention.

Lab Activity 5: Configuring an Intrusion Prevetion System

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

To be submitted in the class at the end of same session
 6

 Presentation I (By Students)

UNEENEED022B:1.1,1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,2.5,2.6,2.7,3.1,3.2,3.3,3.4,3.5,3.6,3.7

To be submitted in the class at the end of same session

Task1: Presentation --10%

 7

 Revision (Lab 1-5)

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

 
 8

 Lab Exam I

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

Task 2: Lab Test --20%
 9Lecture: Securing the Local Area Network.

Lab Activity6 : Securing Layer 2 Switches

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7
To be submitted in the class at the end of same session
 10Lecture: Cryptographic Systems.

Lab Activity 7: Exploring Encryption Methods.

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7
To be submitted in the class at the end of same session
 11Lecture: Implementing Virtual Private Networks.

Lab Activity 8: Configuring a Site-to Site VPN Using Cisco IOS

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7
To be submitted in the class at the end of same session
 12Lecture: Managing a Secure Network.

Lab Activity 9: Configuring a Remote Access VPN Server and Client

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7
To be submitted in the class at the end of same session
 13

Lab Activity 10: Configuring a Remote Access VPN Server and Client

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

To be submitted in the class at the end of same session
 14Presentation II (By Students)
UNEENEED022B:1.1,1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,2.5,2.6,2.7,3.1,3.2,3.3,3.4,3.5,3.6,3.7
To be submitted in the class at the end of same session
 15

Lab Revision Revision

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

Task1: Presentation --10%
 16

Lab Exam II

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7

Task 2: Lab Test --20%
 17&18 Centralised Examination

UNEENEED022B:1.2,1.3,1.4,1.5,1.6,2.1,2.2,2.3,2.4,3.1,3.2,3.3,3.4 ,3.5,3.6,3.7
Task 3:Written Exam--40%
 


Learning Resources

Prescribed Texts


References


Other Resources

http://cisco.netacad.net

Students’ share-drive "S:\" and Blackboard


Overview of Assessment

Assessment may incorporate a variety of methods including written/oral activities and demonstration of practical skills to the relevant industry standards. Participants are advised that they are likely to be asked to personally demonstrate their assessment activities to their teacher/assessor. Feedback will be provided throughout the course.


Assessment Tasks

Lab 1 Exam: 20 %

Lab 2 Exam :20 %

Presentation I:  10 %

Presentation II: 10%

Written Exam: 40%

 

This course is graded using the following course grades-

CHD- Competent with High Distinction
CDI- Competent with Distinction
CC- Competent with Credit
CAG- Competency Achieved - Graded
NYC- Not Yet Competent
DNS- Did Not Submit for Assessment

Make sure you understand the special consideration policy available at -

http://www.rmit.edu.au/browse;ID=qkssnx1c5r0y


Assessment Matrix

National Competency CodeTitlePresentationLab TestsWritten Exam
UEENEED022BDesign and Implement Internetworking Systems SEcurityXXX

Other Information

This course is only run for Networing Stream (non-articulation).

 

In this Course , minimum student directed hours are 32 in addition to 68 scheduled teaching hours. Student directed hours involve completing activities such as reading online resources, prepartion for presentation.

Course Overview: Access Course Overview