silabus cisco8
TRANSCRIPT
-
7/29/2019 SILABUS Cisco8
1/5
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
SILABUS
NAMA SEKOLAH : SMK Telekomunikasi Tunas HarapanMATA PELAJARAN : Network SecurityKELAS/SEMESTER : XI / GenapSTANDAR KOMPETENSI : Network SecurityKODE : CCNAD1-8
ALOKASI WAKTU : 34 X 45 menit
KOMPETENSIDASAR
MATERIPEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
1. Identify anddescribe thevarious
networkingthreats
The significance ofnetwork securitybreaches
The four categories ofnetwork threats
External and internalsecurity threats
Social Engineeringtechniques as amechanism for exploitinghuman weaknesses
Information is a valuablecommodity that can bebought, sold, and stolen.
Describe the risks and cost associatedwith network security failures.
Differentiate the four categories of
security threats. Differentiate external and internal
security threats.
Explain and differentiate socialengineering techniques that targetnetwork security including pretexting,phishing, and vhishing.
Students will often thinkof network securityfailures as softwarebased. Theirunderstanding ofhacking is usually limitedto the process wherebya talented softwareprogrammer breaks thecode of a network andaccesses critical andvaluable data, or simplyplaces a virus or worm ina network that causesperformance problems.Seldom do studentsthink of the socialengineering aspect ofnetwork security andhow vulnerable usersare on an individuallevel.
Tes Tertulis
Tes Praktek
Tugas
2 4(8)
2(8)
CCNA DiscoveryCourse
Internet
SoftwareSimulatorJaringanKomputer
2. Identify differentmethods of attack
Viruses, worms, andTrojan Horses
Denial of Service Attacks
Differentiate viruses, worms, andTrojan Horses, as software-basedthreats to network security.
Students often think ofspam, pop-ups, andcookies as annoying
Tes Tertulis
Tes Praktek
Tugas
2 4(8)
2(8)
CCNA DiscoveryCourse
.
PROGRAM KEAHLIAN: SILABUS - Network Security
TEKNIK KOMPUTER DAN JARINGAN Halaman 1 dari 5
-
7/29/2019 SILABUS Cisco8
2/5
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSIDASAR
MATERIPEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN
ALOKASI WAKTU SUMBERBELAJARTM PS PI
(DoS)
Distributed Denial ofServices Attacks (DDoS)
Brute Force Attacks
Privacy invading toolsincluding spyware,cookies, adware, andpop-ups
Spam
Explain, demonstrate, and differentiate"synchronous flooding" and "ping todeath" as common DoS methods ofattack.
Differentiate DDoS from DoS as athreat to large-scale networks.
Explain a Brute Force attack asflooding of the login function of anetwork.
Define and differentiate the use ofspyware, cookies, adware, and pop-ups and explain how these toolsinvade network user p rivacy.
Explain how spam can threatennetwork performance.
intrusions. However, thefact that these programshave a negative impacton the overallperformance of anetwork is a newconcept for moststudents. They generallywill not have thoughtthrough the trade-offsassociated with blockingthe messages forsecurity purposes andthe impact on useraccess and userexperience.
Internet
SoftwareSimulatorJaringanKomputer
3. Describe securityprocedures andapplications
The network securitypolicy
Network securityprocedures
Network security toolsand applications
Define the components of a networksecurity policy.
Demonstrate the process ofconstructing a network security policy.
Define the components of networksecurity procedures.
Demonstrate the process ofconstructing network securityprocedures.
Introduce and demonstrate keynetwork security tools andapplications.
Explain how to detect viruses in a
network.
Differentiatingorganizational policiesand procedures is a newconcept for moststudents at this level.While students will havebeen introduced topolicies and proceduresin organizations in whichthey have participated,they may think of theseconcepts as the samething and fail to
understand theirhierarchical relationship.
Tes Tertulis
Tes Praktek
Tugas
2 5(10)
2(8)
CCNA DiscoveryCourse
Internet
SoftwareSimulatorJaringanKomputer
4. Describe thefeatures of afirewall and how itcan be used to
The firewall as one of themost effective tools innetwork security
Filtering schemes
Introduce the firewall as product forsecuring networks.
Define and differentiate appliancebased, server based, integrated, and
A firewall residesbetween two or morenetworks and controlsthe traffic between them
Tes Tertulis
Tes Praktek
Tugas
2 5(10)
2(8)
CCNA DiscoveryCourse
Inter
.
PROGRAM KEAHLIAN: SILABUS - Network Security
TEKNIK KOMPUTER DAN JARINGAN Halaman 2 dari 5
-
7/29/2019 SILABUS Cisco8
3/5
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI
DASAR
MATERI
PEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN
ALOKASI WAKTU SUMBER
BELAJARTM PS PI
protect against anattack
implemented in firewalls
Firewall implementationof Network AddressTranslation (NAT)
The differing forms andstructures of firewalls
Tools for testing networksecurity
Recommended practicesfor securing networks
personal firewalls.
Explain packet filtering.
Explain Application/Web Site filtering.
Illustrate the architecture of a firewallimplementation.
Define and illustrate the role of ademilitarized zone (DMZ) or extranet.
Differentiate and illustrate singlefirewall configurations and two firewallconfigurations.
Illustrate the use of IntegratedRouter's in enabling network securityin the home and small business.
Introduce and demonstrate the use ofa vulnerability analysis tool.
Discuss the recommended practicesfor securing a network.
as well as helps preventunauthorized access.
Packet filtering is a wayto deny or allow accessto packets based onMAC and IP addresses.
Application/Web Sitefiltering denies or allowsaccess based onapplication, keyword, orURL addresses.
Stateful Packet
Inspection is a tool forfiltering unsolicitedpackets.
Network AddressTranslation is a schemeto protect internalnetwork addresses fromexternal users.
Firewalls areimplemented betweenthe internal network(intranet) and theInternet.
A demilitarized zone, orextranet is an area of a
network that isaccessible to bothinternal and externaluser.
Single firewallconfigurations use threeseparate interfaces on a
net
SoftwareSimulatorJaringanKomputer
.
PROGRAM KEAHLIAN: SILABUS - Network Security
TEKNIK KOMPUTER DAN JARINGAN Halaman 3 dari 5
-
7/29/2019 SILABUS Cisco8
4/5
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI
DASAR
MATERI
PEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN
ALOKASI WAKTU SUMBER
BELAJARTM PS PI
single router, with oneinterface for the externalnetwork, one for theinternal network, andone for the DMZnetwork.
Two firewallconfigurations use tworouters to separateinternal and externalfirewall with the DMZlocated between them.
Integrated Router's and
other home networkingdevices frequentlysupport DMZ and ofteninclude Network AddressTranslation (NAT),Stateful PacketInspection (SPI) and IP,Application and web sitefiltering capabilities.
Vulnerability analysistools, known as securityscanners, test host andnetwork security.
Keterangan
TM : Tatap MukaPS : Praktek di Sekolah (2 jam praktik di sekolah setara dengan 1 jam tatap muka)PI : Praktek di Industri (4 jam praktik di Du/ Di setara dengan 1 jam tatap muka)
.
PROGRAM KEAHLIAN: SILABUS - Network Security
TEKNIK KOMPUTER DAN JARINGAN Halaman 4 dari 5
-
7/29/2019 SILABUS Cisco8
5/5
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
.
PROGRAM KEAHLIAN: SILABUS - Network Security
TEKNIK KOMPUTER DAN JARINGAN Halaman 5 dari 5