silabus cisco8

Upload: aris3t4354

Post on 14-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 SILABUS Cisco8

    1/5

    KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

    SILABUS

    NAMA SEKOLAH : SMK Telekomunikasi Tunas HarapanMATA PELAJARAN : Network SecurityKELAS/SEMESTER : XI / GenapSTANDAR KOMPETENSI : Network SecurityKODE : CCNAD1-8

    ALOKASI WAKTU : 34 X 45 menit

    KOMPETENSIDASAR

    MATERIPEMBELAJARAN

    KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

    BELAJARTM PS PI

    1. Identify anddescribe thevarious

    networkingthreats

    The significance ofnetwork securitybreaches

    The four categories ofnetwork threats

    External and internalsecurity threats

    Social Engineeringtechniques as amechanism for exploitinghuman weaknesses

    Information is a valuablecommodity that can bebought, sold, and stolen.

    Describe the risks and cost associatedwith network security failures.

    Differentiate the four categories of

    security threats. Differentiate external and internal

    security threats.

    Explain and differentiate socialengineering techniques that targetnetwork security including pretexting,phishing, and vhishing.

    Students will often thinkof network securityfailures as softwarebased. Theirunderstanding ofhacking is usually limitedto the process wherebya talented softwareprogrammer breaks thecode of a network andaccesses critical andvaluable data, or simplyplaces a virus or worm ina network that causesperformance problems.Seldom do studentsthink of the socialengineering aspect ofnetwork security andhow vulnerable usersare on an individuallevel.

    Tes Tertulis

    Tes Praktek

    Tugas

    2 4(8)

    2(8)

    CCNA DiscoveryCourse

    Internet

    SoftwareSimulatorJaringanKomputer

    2. Identify differentmethods of attack

    Viruses, worms, andTrojan Horses

    Denial of Service Attacks

    Differentiate viruses, worms, andTrojan Horses, as software-basedthreats to network security.

    Students often think ofspam, pop-ups, andcookies as annoying

    Tes Tertulis

    Tes Praktek

    Tugas

    2 4(8)

    2(8)

    CCNA DiscoveryCourse

    .

    PROGRAM KEAHLIAN: SILABUS - Network Security

    TEKNIK KOMPUTER DAN JARINGAN Halaman 1 dari 5

  • 7/29/2019 SILABUS Cisco8

    2/5

    KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

    KOMPETENSIDASAR

    MATERIPEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN

    ALOKASI WAKTU SUMBERBELAJARTM PS PI

    (DoS)

    Distributed Denial ofServices Attacks (DDoS)

    Brute Force Attacks

    Privacy invading toolsincluding spyware,cookies, adware, andpop-ups

    Spam

    Explain, demonstrate, and differentiate"synchronous flooding" and "ping todeath" as common DoS methods ofattack.

    Differentiate DDoS from DoS as athreat to large-scale networks.

    Explain a Brute Force attack asflooding of the login function of anetwork.

    Define and differentiate the use ofspyware, cookies, adware, and pop-ups and explain how these toolsinvade network user p rivacy.

    Explain how spam can threatennetwork performance.

    intrusions. However, thefact that these programshave a negative impacton the overallperformance of anetwork is a newconcept for moststudents. They generallywill not have thoughtthrough the trade-offsassociated with blockingthe messages forsecurity purposes andthe impact on useraccess and userexperience.

    Internet

    SoftwareSimulatorJaringanKomputer

    3. Describe securityprocedures andapplications

    The network securitypolicy

    Network securityprocedures

    Network security toolsand applications

    Define the components of a networksecurity policy.

    Demonstrate the process ofconstructing a network security policy.

    Define the components of networksecurity procedures.

    Demonstrate the process ofconstructing network securityprocedures.

    Introduce and demonstrate keynetwork security tools andapplications.

    Explain how to detect viruses in a

    network.

    Differentiatingorganizational policiesand procedures is a newconcept for moststudents at this level.While students will havebeen introduced topolicies and proceduresin organizations in whichthey have participated,they may think of theseconcepts as the samething and fail to

    understand theirhierarchical relationship.

    Tes Tertulis

    Tes Praktek

    Tugas

    2 5(10)

    2(8)

    CCNA DiscoveryCourse

    Internet

    SoftwareSimulatorJaringanKomputer

    4. Describe thefeatures of afirewall and how itcan be used to

    The firewall as one of themost effective tools innetwork security

    Filtering schemes

    Introduce the firewall as product forsecuring networks.

    Define and differentiate appliancebased, server based, integrated, and

    A firewall residesbetween two or morenetworks and controlsthe traffic between them

    Tes Tertulis

    Tes Praktek

    Tugas

    2 5(10)

    2(8)

    CCNA DiscoveryCourse

    Inter

    .

    PROGRAM KEAHLIAN: SILABUS - Network Security

    TEKNIK KOMPUTER DAN JARINGAN Halaman 2 dari 5

  • 7/29/2019 SILABUS Cisco8

    3/5

    KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

    KOMPETENSI

    DASAR

    MATERI

    PEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN

    ALOKASI WAKTU SUMBER

    BELAJARTM PS PI

    protect against anattack

    implemented in firewalls

    Firewall implementationof Network AddressTranslation (NAT)

    The differing forms andstructures of firewalls

    Tools for testing networksecurity

    Recommended practicesfor securing networks

    personal firewalls.

    Explain packet filtering.

    Explain Application/Web Site filtering.

    Illustrate the architecture of a firewallimplementation.

    Define and illustrate the role of ademilitarized zone (DMZ) or extranet.

    Differentiate and illustrate singlefirewall configurations and two firewallconfigurations.

    Illustrate the use of IntegratedRouter's in enabling network securityin the home and small business.

    Introduce and demonstrate the use ofa vulnerability analysis tool.

    Discuss the recommended practicesfor securing a network.

    as well as helps preventunauthorized access.

    Packet filtering is a wayto deny or allow accessto packets based onMAC and IP addresses.

    Application/Web Sitefiltering denies or allowsaccess based onapplication, keyword, orURL addresses.

    Stateful Packet

    Inspection is a tool forfiltering unsolicitedpackets.

    Network AddressTranslation is a schemeto protect internalnetwork addresses fromexternal users.

    Firewalls areimplemented betweenthe internal network(intranet) and theInternet.

    A demilitarized zone, orextranet is an area of a

    network that isaccessible to bothinternal and externaluser.

    Single firewallconfigurations use threeseparate interfaces on a

    net

    SoftwareSimulatorJaringanKomputer

    .

    PROGRAM KEAHLIAN: SILABUS - Network Security

    TEKNIK KOMPUTER DAN JARINGAN Halaman 3 dari 5

  • 7/29/2019 SILABUS Cisco8

    4/5

    KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

    KOMPETENSI

    DASAR

    MATERI

    PEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN

    ALOKASI WAKTU SUMBER

    BELAJARTM PS PI

    single router, with oneinterface for the externalnetwork, one for theinternal network, andone for the DMZnetwork.

    Two firewallconfigurations use tworouters to separateinternal and externalfirewall with the DMZlocated between them.

    Integrated Router's and

    other home networkingdevices frequentlysupport DMZ and ofteninclude Network AddressTranslation (NAT),Stateful PacketInspection (SPI) and IP,Application and web sitefiltering capabilities.

    Vulnerability analysistools, known as securityscanners, test host andnetwork security.

    Keterangan

    TM : Tatap MukaPS : Praktek di Sekolah (2 jam praktik di sekolah setara dengan 1 jam tatap muka)PI : Praktek di Industri (4 jam praktik di Du/ Di setara dengan 1 jam tatap muka)

    .

    PROGRAM KEAHLIAN: SILABUS - Network Security

    TEKNIK KOMPUTER DAN JARINGAN Halaman 4 dari 5

  • 7/29/2019 SILABUS Cisco8

    5/5

    KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

    .

    PROGRAM KEAHLIAN: SILABUS - Network Security

    TEKNIK KOMPUTER DAN JARINGAN Halaman 5 dari 5