High-level Programming of Computer Network Security Systems

Major: Administration of Cybersecurity Systems
Code of subject: 7.125.04.E.031
Credits: 4.00
Department: Information Security
Lecturer: I.Ya. Tyshyk
Semester: 2 семестр
Mode of study: денна
Learning outcomes: PH8. Research, develop and support systems and means of information security and/or cyber security at objects of information activity and critical infrastructure. PH9. Analyze, develop and support the organization's information security and/or cyber security management system based on the information security strategy and policy. PH14. Analyze, develop and support the system of auditing and monitoring the effectiveness of the functioning of information systems and technologies, business/operational processes in the field of information and/or cyber security as a whole. PH16. Make informed decisions on organizational and technical issues of information security and/or cyber security in complex and unpredictable conditions, including using modern methods and means of optimization, forecasting and decision-making. PH19. Choose, analyze and develop suitable typical analytical, calculation and experimental methods of cyber protection, develop, implement and support projects on the protection of information in cyberspace, innovative activities and protection of intellectual property. PH22. Plan and perform experimental and theoretical research, propose and test hypotheses, choose suitable methods and tools for this, carry out statistical processing of data, evaluate the reliability of research results, argue conclusions.
Required prior and related subjects: Previous academic disciplines Computer networks Information and analytical security Methods and means of information protection Related and subsequent disciplines Software protection Integrated systems of authorized access Design of complex information protection systems
Summary of the subject: Introduction. Network infrastructure protection. Protection of physical devices. Cisco Switch Software Protection: Describe and Configure Secure Ports. Software protection of the administrative interface of network devices based on Cisco IOS. Cisco IOS-based router communication organization and software security. Implement remote access to Cisco routers using indirect authentication. Software configuration of the mechanism of translation of network addresses and ports on the basis of IOS of a router. CISCO network perimeter security systems: capabilities of routers and firewalls. Design of computer network perimeter security systems based on the CISCO IOS router. Design of corporate network security systems using software and hardware firewalls. How to configure a demilitarized zone (DMZ) based on Cisco IOS. Cisco IOS-based ad filtering software. CISCO router configuration rules for IPSec support. Designing a virtual private network between the corporation's offices based on the Cisco iOS router. Rules for configuring IPSec encryption settings in the software and hardware firewall. Design of a virtual private network between the offices of the corporation on the basis of software and hardware firewalls. Design of network equipment protection systems of the corporation for the implementation of RA VPN.
Assessment methods and criteria: Examination Current control (PC) 40 Examination control 60 Total for discipline 100
Recommended books: 1. Wenstrom M. Organization of Cisco network protection / M. Wenstrom. Per. from English. ?K .: "Williams", 2005. ? 768 p. il. 2. Rybalsky OV Information protection in information and communication systems. Textbook for cadets of universities of the Ministry of Internal Affairs of Ukraine / О.В. Rybalsky, VG Хахановський, В.А. Kudinov, VM Smaglyuk. - К .: Вид. National Academy of Internal Affairs Affairs, 2013. - 118 p. 3. Popovsky VV Protection of information in telecommunication systems: Textbook in 2 volumes / VV Поповский, А.В. Peaches. - Kharkiv: SMIT Company LLC, 2006. - 238 p. [1]. - 292 c. [2].